Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/99892?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/99892?format=api", "purl": "pkg:rpm/redhat/rh-mysql80-mysql@8.0.26-1?arch=el7", "type": "rpm", "namespace": "redhat", "name": "rh-mysql80-mysql", "version": "8.0.26-1", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56998?format=api", "vulnerability_id": "VCID-11tt-44je-dfg8", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14775", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80644", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80652", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80781", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80674", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.8067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80698", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80708", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80724", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80711", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80703", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80737", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80738", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80741", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80768", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14775" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890784", "reference_id": "1890784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890784" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14775" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-11tt-44je-dfg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57023?format=api", "vulnerability_id": "VCID-187q-sxxu-zyh5", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14836", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7041", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70424", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70564", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70489", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70517", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70525", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70505", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70555", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70441", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70419", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70465", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70504", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14836" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890763", "reference_id": "1890763", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890763" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:40Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14836" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-187q-sxxu-zyh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80385?format=api", "vulnerability_id": "VCID-1b6h-r8cr-7be7", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2169", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82369", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82383", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82519", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82425", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82451", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82447", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82442", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82477", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82479", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82483", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82505", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82515", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.824", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82397", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2169" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951756", "reference_id": "1951756", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951756" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2169" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6h-r8cr-7be7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80391?format=api", "vulnerability_id": "VCID-1muw-xrgz-uub8", "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2179", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82369", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82383", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82519", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82425", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82451", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82447", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82442", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82477", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82479", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82483", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82505", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82515", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.824", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82397", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2179" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951761", "reference_id": "1951761", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951761" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2179" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1muw-xrgz-uub8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57040?format=api", "vulnerability_id": "VCID-1vkz-z2pq-nbat", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14861" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890773", "reference_id": "1890773", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890773" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:15Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14861" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vkz-z2pq-nbat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57009?format=api", "vulnerability_id": "VCID-1vm5-s57q-5fh7", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14800", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.5534", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55452", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55415", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55515", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55498", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55422", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55442", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55476", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55454", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55506", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55507", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55516", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55495", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890753", "reference_id": "1890753", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890753" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:14Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14800" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vm5-s57q-5fh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57010?format=api", "vulnerability_id": "VCID-26c7-8j5m-pygt", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58885", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.5896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58991", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59026", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59007", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58989", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59023", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59027", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59005", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59006", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14804" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890754", "reference_id": "1890754", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890754" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:09Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14804" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26c7-8j5m-pygt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57140?format=api", "vulnerability_id": "VCID-29k9-yssc-jbec", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2036", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2036" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922395", "reference_id": "1922395", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922395" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2036" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-29k9-yssc-jbec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57145?format=api", "vulnerability_id": "VCID-2fyj-vfka-g3fc", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2046", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922398", "reference_id": "1922398", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922398" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2046" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2fyj-vfka-g3fc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57151?format=api", "vulnerability_id": "VCID-2hqz-t746-57bt", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2060", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42745", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2060" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922402", "reference_id": "1922402", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922402" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2060" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2hqz-t746-57bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80143?format=api", "vulnerability_id": "VCID-2sc2-r3y9-37as", "summary": "mysql: Server: Federated unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2354", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58105", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58191", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5819", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5826", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58252", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58227", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58204", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58238", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992298", "reference_id": "1992298", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992298" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2354" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2sc2-r3y9-37as" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80145?format=api", "vulnerability_id": "VCID-2sdk-9wte-n7ct", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2357", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59643", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59716", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59763", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59796", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59789", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5976", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59778", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59762", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2357" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992300", "reference_id": "1992300", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992300" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2357" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2sdk-9wte-n7ct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57014?format=api", "vulnerability_id": "VCID-2ytu-hw3r-ffc8", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42745", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14814" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890757", "reference_id": "1890757", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890757" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:00Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14814" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytu-hw3r-ffc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57051?format=api", "vulnerability_id": "VCID-2zv1-9c2g-fkdq", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14893", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52483", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.5253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52544", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52603", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52628", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52635", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52571", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52582", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52575", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52569", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.5262", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14893" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890783", "reference_id": "1890783", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890783" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:50Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14893" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2zv1-9c2g-fkdq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80146?format=api", "vulnerability_id": "VCID-31vn-exfm-kuh2", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2367", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63238", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63224", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63197", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2367" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992301", "reference_id": "1992301", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992301" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2367" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-31vn-exfm-kuh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57147?format=api", "vulnerability_id": "VCID-3k3d-296j-kycn", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2055", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2055" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922400", "reference_id": "1922400", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922400" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2055" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3k3d-296j-kycn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57139?format=api", "vulnerability_id": "VCID-3v1d-x9yt-3fbb", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2032", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48776", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48815", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48798", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48844", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.4889", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.4885", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48838", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48847", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.4884", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48849", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48836", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2032" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922394", "reference_id": "1922394", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922394" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2032" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3v1d-x9yt-3fbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80147?format=api", "vulnerability_id": "VCID-3wz3-pm9w-vkd7", "summary": "mysql: Server: DML unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2370", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63238", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63224", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63197", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2370" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992302", "reference_id": "1992302", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992302" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2370" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3wz3-pm9w-vkd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80156?format=api", "vulnerability_id": "VCID-3ye4-pp2j-nkcy", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2399", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2399" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992311", "reference_id": "1992311", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992311" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2399" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ye4-pp2j-nkcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80397?format=api", "vulnerability_id": "VCID-4c8x-j238-bbgz", "summary": "mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76812", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76914", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2201" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951766", "reference_id": "1951766", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951766" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2201" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4c8x-j238-bbgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57146?format=api", "vulnerability_id": "VCID-4fdf-ne4n-wyc2", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2048", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54405", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54481", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54467", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54513", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54492", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.5453", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54532", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.5451", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54488", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54503", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54472", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54525", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54519", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54531", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2048" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922399", "reference_id": "1922399", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922399" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2048" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4fdf-ne4n-wyc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57003?format=api", "vulnerability_id": "VCID-4msq-13an-d7cb", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76678", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76555", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76587", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76598", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76604", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76594", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76636", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7664", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7666", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76666", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747", "reference_id": "1890747", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/", "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/", "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14789" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80415?format=api", "vulnerability_id": "VCID-4qkm-twqk-nud6", "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2300", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54194", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2300" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951781", "reference_id": "1951781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951781" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2300" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qkm-twqk-nud6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57042?format=api", "vulnerability_id": "VCID-4qvq-j6yh-ckbf", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14866" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890774", "reference_id": "1890774", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890774" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:13Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14866" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-j6yh-ckbf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57119?format=api", "vulnerability_id": "VCID-4zfz-7zkz-e7hn", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34706", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34471", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3482", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34864", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34896", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34859", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34836", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34875", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34814", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34578", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34558", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3494", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2002" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922380", "reference_id": "1922380", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922380" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2002" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zfz-7zkz-e7hn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80387?format=api", "vulnerability_id": "VCID-4zyv-b7d8-t7ec", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2171", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76432", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76577", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76479", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76493", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76519", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76498", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76492", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76532", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76536", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76524", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76558", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76563", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76465", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76447", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2171" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951758", "reference_id": "1951758", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951758" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2171" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zyv-b7d8-t7ec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80409?format=api", "vulnerability_id": "VCID-537e-defy-1qgh", "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2232", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30159", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29762", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3006", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30015", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29945", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29829", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30123", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30162", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30119", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30069", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30083", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2232" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951776", "reference_id": "1951776", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951776" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2232" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-537e-defy-1qgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80167?format=api", "vulnerability_id": "VCID-5hjy-fmy7-cyac", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54194", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2427" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992321", "reference_id": "1992321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2427" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjy-fmy7-cyac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80162?format=api", "vulnerability_id": "VCID-5msw-bc1r-23e7", "summary": "mysql: Server: PS unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2422", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41132", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41224", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.40956", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41256", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41153", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41042", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41037", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41253", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.4118", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41236", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41258", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41227", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00193", "scoring_system": "epss", "scoring_elements": "0.41213", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2422" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992317", "reference_id": "1992317", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2422" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5msw-bc1r-23e7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56999?format=api", "vulnerability_id": "VCID-5sgr-q6mn-u7gq", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76678", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76555", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76587", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76598", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76604", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76594", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76636", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7664", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.7666", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76666", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743", "reference_id": "1890743", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/", "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/", "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14776" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57004?format=api", "vulnerability_id": "VCID-5ug6-v7ru-j3bv", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14790", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74705", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.7483", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74735", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74741", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74779", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74749", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74793", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74783", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74819", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74827", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14790" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890748", "reference_id": "1890748", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890748" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14790" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ug6-v7ru-j3bv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80140?format=api", "vulnerability_id": "VCID-6674-4tmg-1qbg", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41408", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41413", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41422", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41442", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.4141", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41395", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41337", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41228", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41222", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41142", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2339" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992280", "reference_id": "1992280", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2339" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6674-4tmg-1qbg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57118?format=api", "vulnerability_id": "VCID-66fe-xw3w-xbfh", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58168", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58326", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58283", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58316", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58318", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58295", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58257", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.5827", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2001" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922379", "reference_id": "1922379", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922379" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2001" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-66fe-xw3w-xbfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80412?format=api", "vulnerability_id": "VCID-6dtf-9d7c-buep", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2293", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76812", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76914", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2293" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951778", "reference_id": "1951778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951778" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2293" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dtf-9d7c-buep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57001?format=api", "vulnerability_id": "VCID-6grs-76qf-jqhf", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14785", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74539", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74442", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74417", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7446", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74498", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74506", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74532", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7454", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14785" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890745", "reference_id": "1890745", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890745" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14785" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6grs-76qf-jqhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80150?format=api", "vulnerability_id": "VCID-6u9x-qcnt-cqc8", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54814", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54889", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54929", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54941", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54923", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54938", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5492", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54895", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54914", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54911", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.5493", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2383" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992305", "reference_id": "1992305", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992305" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2383" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6u9x-qcnt-cqc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57011?format=api", "vulnerability_id": "VCID-6w26-6psj-zubm", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14809", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14809" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890755", "reference_id": "1890755", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890755" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:05Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14809" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6w26-6psj-zubm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57018?format=api", "vulnerability_id": "VCID-6z2t-rt9t-wydy", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76219", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76223", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76365", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76279", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7632", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76325", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76309", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76345", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76353", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76254", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76234", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76266", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.7628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76306", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00942", "scoring_system": "epss", "scoring_elements": "0.76284", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14828" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890760", "reference_id": "1890760", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890760" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:02Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14828" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6z2t-rt9t-wydy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57032?format=api", "vulnerability_id": "VCID-71bd-rm5x-cud8", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14848", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14848" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890770", "reference_id": "1890770", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890770" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:27Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14848" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-71bd-rm5x-cud8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80386?format=api", "vulnerability_id": "VCID-77bs-kuvf-eua3", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2170", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79134", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.7914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79265", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79194", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79185", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79208", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79242", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79248", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79165", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2170" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951757", "reference_id": "1951757", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951757" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2170" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-77bs-kuvf-eua3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57024?format=api", "vulnerability_id": "VCID-7jj8-tenv-zub1", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14837", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42745", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14837" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890764", "reference_id": "1890764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890764" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:39Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14837" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jj8-tenv-zub1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80407?format=api", "vulnerability_id": "VCID-7shp-crcm-vqfe", "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2226", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82386", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82401", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82536", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82495", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82499", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82522", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82532", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82419", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82415", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82443", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82449", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82463", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82459", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01732", "scoring_system": "epss", "scoring_elements": "0.82494", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2226" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951774", "reference_id": "1951774", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951774" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2226" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7shp-crcm-vqfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80158?format=api", "vulnerability_id": "VCID-82ep-d3fc-dbc2", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2410", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2410" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992313", "reference_id": "1992313", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992313" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2410" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-82ep-d3fc-dbc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57132?format=api", "vulnerability_id": "VCID-8h4m-83xa-m7df", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2021", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97882", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97887", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97915", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97888", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97891", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97895", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97898", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97901", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97902", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97903", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.9791", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.51799", "scoring_system": "epss", "scoring_elements": "0.97909", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922388", "reference_id": "1922388", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922388" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2021" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4m-83xa-m7df" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80404?format=api", "vulnerability_id": "VCID-8xpx-1fpf-m3fa", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2215", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76812", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76914", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2215" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951772", "reference_id": "1951772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951772" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2215" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8xpx-1fpf-m3fa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80394?format=api", "vulnerability_id": "VCID-9dt5-yek1-wfg9", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2194", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78612", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78739", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78656", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78688", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78661", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.7869", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78684", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78715", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78722", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.78649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0117", "scoring_system": "epss", "scoring_elements": "0.7863", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951764", "reference_id": "1951764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951764" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2194" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9dt5-yek1-wfg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57027?format=api", "vulnerability_id": "VCID-9ycb-mjma-7qfv", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14839", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42745", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14839" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890766", "reference_id": "1890766", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890766" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:37Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14839" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ycb-mjma-7qfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57000?format=api", "vulnerability_id": "VCID-aaq9-6yhn-afbx", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14777", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74539", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74442", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74417", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7446", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74498", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74506", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74532", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7454", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14777" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890744", "reference_id": "1890744", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890744" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14777" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aaq9-6yhn-afbx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57020?format=api", "vulnerability_id": "VCID-aczd-32sa-fffg", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890761", "reference_id": "1890761", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890761" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:49Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14829" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aczd-32sa-fffg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80151?format=api", "vulnerability_id": "VCID-b4wd-75p9-bqgh", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63238", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63224", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63197", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2384" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992306", "reference_id": "1992306", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992306" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2384" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4wd-75p9-bqgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80170?format=api", "vulnerability_id": "VCID-bg43-1ngx-17cb", "summary": "mysql: Server: DML unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2440", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34671", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34887", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3444", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34784", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34547", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34527", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34835", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34869", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34831", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34845", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2440" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992324", "reference_id": "1992324", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2440" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bg43-1ngx-17cb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80171?format=api", "vulnerability_id": "VCID-byam-rx6m-3yab", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2441", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2441" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992325", "reference_id": "1992325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2441" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byam-rx6m-3yab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80168?format=api", "vulnerability_id": "VCID-c5u7-hdrq-2qcm", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2429", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90078", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.9008", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90147", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90127", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90125", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.9012", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90137", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90134", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90149", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90092", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90096", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90112", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05389", "scoring_system": "epss", "scoring_elements": "0.90118", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2429" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992322", "reference_id": "1992322", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-889/", "reference_id": "ZDI-21-889", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:35Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-889/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2429" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c5u7-hdrq-2qcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57137?format=api", "vulnerability_id": "VCID-c6rw-mujf-qqbj", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2030", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2030" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922392", "reference_id": "1922392", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922392" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2030" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6rw-mujf-qqbj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57153?format=api", "vulnerability_id": "VCID-ch22-5f87-tfhw", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2061", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2061" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922403", "reference_id": "1922403", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922403" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2061" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ch22-5f87-tfhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80153?format=api", "vulnerability_id": "VCID-ckdu-28ct-2kb7", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2387", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2387" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992308", "reference_id": "1992308", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2387" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ckdu-28ct-2kb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57043?format=api", "vulnerability_id": "VCID-cr9r-v269-7qan", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14867", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42745", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14867" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890775", "reference_id": "1890775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890775" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:11Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14867" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr9r-v269-7qan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56987?format=api", "vulnerability_id": "VCID-d5hc-4qz5-3uag", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14672", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.77954", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.77961", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78091", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.7799", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.77998", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78002", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78029", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78012", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78045", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78038", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78071", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01097", "scoring_system": "epss", "scoring_elements": "0.78078", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14672" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890737", "reference_id": "1890737", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890737" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14672" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5hc-4qz5-3uag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57162?format=api", "vulnerability_id": "VCID-d5js-9kvw-dyf9", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2122" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922411", "reference_id": "1922411", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922411" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2122" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5js-9kvw-dyf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57028?format=api", "vulnerability_id": "VCID-da5g-ea4u-qfeh", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14844", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14844" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890767", "reference_id": "1890767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890767" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:32Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14844" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-da5g-ea4u-qfeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57005?format=api", "vulnerability_id": "VCID-dcyd-xspe-q7eh", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14791", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62004", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62063", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62177", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62064", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62132", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62152", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62141", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.6212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62164", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.6217", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62155", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62167", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62183", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14791" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890749", "reference_id": "1890749", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890749" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "2.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14791" ], "risk_score": 1.0, "exploitability": "0.5", "weighted_severity": "2.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyd-xspe-q7eh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57141?format=api", "vulnerability_id": "VCID-dsp1-f2v8-z7fb", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2038", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2038" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922396", "reference_id": "1922396", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922396" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2038" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dsp1-f2v8-z7fb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80410?format=api", "vulnerability_id": "VCID-dv9f-cgsn-skgf", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2278", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76812", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76914", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2278" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951777", "reference_id": "1951777", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951777" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2278" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dv9f-cgsn-skgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80169?format=api", "vulnerability_id": "VCID-dwdy-u6t6-d7d3", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2437", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992323", "reference_id": "1992323", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2437" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dwdy-u6t6-d7d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80400?format=api", "vulnerability_id": "VCID-e7y6-8acx-tuh8", "summary": "mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.8019", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80327", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80274", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80277", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80303", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80309", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80217", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80234", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80263", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80248", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80242", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01375", "scoring_system": "epss", "scoring_elements": "0.80272", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2208" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951769", "reference_id": "1951769", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951769" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2208" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7y6-8acx-tuh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80155?format=api", "vulnerability_id": "VCID-e8ty-bkjz-5bh4", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2390", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84428", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84363", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84385", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84386", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84388", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84414", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84423", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84327", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84329", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.8435", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84374", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84367", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2390" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992310", "reference_id": "1992310", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-881/", "reference_id": "ZDI-21-881", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:17Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-881/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2390" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ty-bkjz-5bh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57156?format=api", "vulnerability_id": "VCID-eh72-pgfd-x3dy", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2070", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2070" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922405", "reference_id": "1922405", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922405" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2070" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eh72-pgfd-x3dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80144?format=api", "vulnerability_id": "VCID-f2hn-79mj-fyer", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2356", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47564", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47584", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47608", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47592", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.4765", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47642", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47595", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47587", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47596", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47533", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00243", "scoring_system": "epss", "scoring_elements": "0.47588", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2356" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992299", "reference_id": "1992299", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992299" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2356" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f2hn-79mj-fyer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80413?format=api", "vulnerability_id": "VCID-fvuq-5szu-akfn", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2298", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81284", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81293", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.8142", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81384", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81386", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81409", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81416", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81315", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81314", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81343", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81348", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81368", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81354", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01537", "scoring_system": "epss", "scoring_elements": "0.81346", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951779", "reference_id": "1951779", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951779" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2298" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fvuq-5szu-akfn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80420?format=api", "vulnerability_id": "VCID-g1py-km6y-uka8", "summary": "mysql: Server: Packaging unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2307", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63453", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63513", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63594", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63584", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63567", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63586", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.636", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6354", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63556", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63574", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63576", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2307" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951785", "reference_id": "1951785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951785" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2307" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1py-km6y-uka8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57160?format=api", "vulnerability_id": "VCID-g58r-8vcn-bfea", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2087", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25744", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25815", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25508", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25659", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25661", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25644", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25615", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25566", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25558", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25858", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.257", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25757", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25717", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2087" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922408", "reference_id": "1922408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922408" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2087" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g58r-8vcn-bfea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80382?format=api", "vulnerability_id": "VCID-gb4c-ypuu-gfgq", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2164", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79134", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.7914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79265", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79194", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79185", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79208", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79242", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79248", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79165", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2164" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951754", "reference_id": "1951754", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951754" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2164" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gb4c-ypuu-gfgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80166?format=api", "vulnerability_id": "VCID-gm7z-m589-77gy", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2426", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54194", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2426" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992320", "reference_id": "1992320", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992320" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2426" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gm7z-m589-77gy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57136?format=api", "vulnerability_id": "VCID-gmxv-dxp3-cuhq", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2028", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2028" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922391", "reference_id": "1922391", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922391" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2028" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmxv-dxp3-cuhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57026?format=api", "vulnerability_id": "VCID-h2r2-p8v7-sfc6", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14838", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48171", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48208", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48239", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.4829", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48285", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.4824", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48221", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48233", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48235", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48254", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14838" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890765", "reference_id": "1890765", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890765" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:38Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14838" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2r2-p8v7-sfc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80152?format=api", "vulnerability_id": "VCID-h558-qvwc-73hv", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60327", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60402", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60475", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60483", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60449", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60491", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60499", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60489", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60473", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60487", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.6043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60397", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60462", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2385" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992307", "reference_id": "1992307", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992307" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2385" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h558-qvwc-73hv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56997?format=api", "vulnerability_id": "VCID-hrbc-2cpw-5be7", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14773", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74539", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74442", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74417", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7446", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74498", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74506", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74532", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7454", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14773" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890742", "reference_id": "1890742", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890742" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14773" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hrbc-2cpw-5be7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79974?format=api", "vulnerability_id": "VCID-hsue-93wh-mygh", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35629", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48128", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48133", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35629" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016116", "reference_id": "2016116", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016116" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35629" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hsue-93wh-mygh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80164?format=api", "vulnerability_id": "VCID-j6as-4yhs-dyhq", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2424" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992318", "reference_id": "1992318", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992318" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2424" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j6as-4yhs-dyhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80148?format=api", "vulnerability_id": "VCID-j734-hefa-1yaa", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49828", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.4985", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49865", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49893", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.4991", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49882", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49883", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49928", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49929", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49901", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49888", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49895", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992303", "reference_id": "1992303", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992303" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/", "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://security.archlinux.org/AVG-2226", "reference_id": "AVG-2226", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2226" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-2/", "reference_id": "USN-5022-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-2/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/", "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2372" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j734-hefa-1yaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57021?format=api", "vulnerability_id": "VCID-jate-mc8k-13gn", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70779", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70794", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70932", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70838", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70891", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.7087", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70925", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70934", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70812", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70869", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70854", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14830" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890762", "reference_id": "1890762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890762" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:48Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14830" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jate-mc8k-13gn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80393?format=api", "vulnerability_id": "VCID-jntg-92ur-nbfa", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2193", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79134", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.7914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79265", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79194", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79185", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79208", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79242", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79248", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79165", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2193" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951763", "reference_id": "1951763", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951763" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2193" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jntg-92ur-nbfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80423?format=api", "vulnerability_id": "VCID-k3vn-aruy-nfan", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76249", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76394", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76296", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76309", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76336", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76314", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.7631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.7635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76355", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76339", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76374", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76382", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76284", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76264", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2174" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952802", "reference_id": "1952802", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952802" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2174" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k3vn-aruy-nfan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57031?format=api", "vulnerability_id": "VCID-k4fk-qkr8-1uac", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14846", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70779", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70794", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70932", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70838", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70891", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.7087", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70925", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70934", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70812", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70869", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70854", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14846" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890769", "reference_id": "1890769", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890769" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:29Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14846" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4fk-qkr8-1uac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80389?format=api", "vulnerability_id": "VCID-kff6-5fr1-1khv", "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2172", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.79972", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.79979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80101", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.79991", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80028", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80048", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80031", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80024", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80052", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80053", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80081", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80086", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01342", "scoring_system": "epss", "scoring_elements": "0.80001", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2172" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951759", "reference_id": "1951759", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951759" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2172" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kff6-5fr1-1khv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57138?format=api", "vulnerability_id": "VCID-kwfb-kbpq-pkck", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2031", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2031" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922393", "reference_id": "1922393", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922393" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2031" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfb-kbpq-pkck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57158?format=api", "vulnerability_id": "VCID-m2ey-feyg-ufb7", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2076", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2076" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922407", "reference_id": "1922407", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922407" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2076" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2ey-feyg-ufb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57165?format=api", "vulnerability_id": "VCID-muzn-dqpe-q7cr", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89099", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.8918", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.8915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89146", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89157", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89154", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89171", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04512", "scoring_system": "epss", "scoring_elements": "0.89176", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2180" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951762", "reference_id": "1951762", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951762" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.gentoo.org/glsa/202105-28", "reference_id": "GLSA-202105-28", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/" } ], "url": "https://security.gentoo.org/glsa/202105-28" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2180" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-muzn-dqpe-q7cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57125?format=api", "vulnerability_id": "VCID-my1q-4m9d-9fgj", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2011", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84153", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84167", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84288", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84226", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84244", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84245", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.8425", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84274", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84284", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02144", "scoring_system": "epss", "scoring_elements": "0.84186", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2011" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922384", "reference_id": "1922384", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922384" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/", "reference_id": "ntap-20210622-0001", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210622-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2327", "reference_id": "RHSA-2019:2327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2011" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-my1q-4m9d-9fgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80149?format=api", "vulnerability_id": "VCID-n7tf-y62f-wyfe", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2374", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37312", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.36973", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37402", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3734", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37386", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37368", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37091", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37061", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37499", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37378", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3739", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2374" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992304", "reference_id": "1992304", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992304" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2374" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7tf-y62f-wyfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57161?format=api", "vulnerability_id": "VCID-n9r2-crxf-jfh7", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2088", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25744", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25815", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25508", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25659", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25661", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25644", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25615", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25566", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25558", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25858", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.257", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25757", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25717", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2088" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922410", "reference_id": "1922410", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922410" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2088" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n9r2-crxf-jfh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57015?format=api", "vulnerability_id": "VCID-ndhs-j4q8-zkf8", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14821", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14821" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890758", "reference_id": "1890758", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890758" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:53Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14821" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ndhs-j4q8-zkf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80379?format=api", "vulnerability_id": "VCID-njb2-z4kz-zybs", "summary": "mysql: Server: Options unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82369", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82383", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82519", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82425", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82451", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82447", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82442", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82477", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82479", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82483", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82505", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82515", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.824", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82397", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951751", "reference_id": "1951751", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951751" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2146" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njb2-z4kz-zybs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57030?format=api", "vulnerability_id": "VCID-njkb-a6xx-wke9", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42745", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14845" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890768", "reference_id": "1890768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890768" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:31Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14845" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njkb-a6xx-wke9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57148?format=api", "vulnerability_id": "VCID-p15d-cz1g-hucw", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2056", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922419", "reference_id": "1922419", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922419" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2056" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p15d-cz1g-hucw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80395?format=api", "vulnerability_id": "VCID-p559-ueva-ffgv", "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2196", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79134", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.7914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79265", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79194", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79185", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79208", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79242", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79248", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01233", "scoring_system": "epss", "scoring_elements": "0.79165", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2196" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951765", "reference_id": "1951765", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951765" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2196" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p559-ueva-ffgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80414?format=api", "vulnerability_id": "VCID-p6g6-hqgv-vuce", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2299", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54194", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2299" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951780", "reference_id": "1951780", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951780" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2299" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p6g6-hqgv-vuce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57044?format=api", "vulnerability_id": "VCID-pawh-67dd-xbay", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14868", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14868" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890776", "reference_id": "1890776", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890776" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:10Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14868" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pawh-67dd-xbay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56995?format=api", "vulnerability_id": "VCID-pfkc-qtn3-skgp", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14769", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80644", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80652", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80781", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80674", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.8067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80698", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80708", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80724", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80711", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80703", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80737", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80738", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80741", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80768", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14769" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890739", "reference_id": "1890739", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890739" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14769" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pfkc-qtn3-skgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56994?format=api", "vulnerability_id": "VCID-pmhc-1rhq-gfeb", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82525", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82539", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82667", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82554", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8255", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82576", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82584", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82602", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82596", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82626", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82629", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82661", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738", "reference_id": "1890738", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/", "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/", "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14765" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57037?format=api", "vulnerability_id": "VCID-ptkb-y547-skg4", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40685", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.4049", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40759", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40681", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40585", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40573", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40796", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40722", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40772", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40798", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40763", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14860" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890772", "reference_id": "1890772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890772" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:17Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14860" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkb-y547-skg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57012?format=api", "vulnerability_id": "VCID-qe1p-f4h5-uyga", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80331", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80466", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80358", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80347", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80386", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80405", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.8039", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80383", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80412", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80413", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80417", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80442", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01394", "scoring_system": "epss", "scoring_elements": "0.80449", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756", "reference_id": "1890756", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/", "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/", "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14812" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80418?format=api", "vulnerability_id": "VCID-qqae-rsw8-x7gp", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2304", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52023", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52071", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52074", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52175", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52157", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52104", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52111", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52097", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52062", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52112", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52131", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00287", "scoring_system": "epss", "scoring_elements": "0.52172", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2304" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951783", "reference_id": "1951783", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951783" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2304" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqae-rsw8-x7gp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57007?format=api", "vulnerability_id": "VCID-qrcr-rtqs-f3g7", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14794", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74539", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74442", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74417", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7446", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74498", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74506", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74532", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7454", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14794" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890751", "reference_id": "1890751", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890751" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14794" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qrcr-rtqs-f3g7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80154?format=api", "vulnerability_id": "VCID-qv7j-a4nn-97f7", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68107", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68028", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68042", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68066", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68052", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68017", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68067", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.6805", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68093", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.68101", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00552", "scoring_system": "epss", "scoring_elements": "0.67979", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992309", "reference_id": "1992309", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992309" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/", "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/" }, { "reference_url": "https://security.archlinux.org/AVG-2226", "reference_id": "AVG-2226", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-2/", "reference_id": "USN-5022-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-2/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/", "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-880/", "reference_id": "ZDI-21-880", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-880/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2389" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7j-a4nn-97f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79953?format=api", "vulnerability_id": "VCID-qzc8-kgrw-7yg2", "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35145", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35346", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.34897", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35291", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35241", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35007", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.34987", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35373", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35255", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35301", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35325", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35327", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.3529", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35267", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35305", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35537" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016092", "reference_id": "2016092", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016092" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35537" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qzc8-kgrw-7yg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80403?format=api", "vulnerability_id": "VCID-r4wz-4cet-p3ch", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70736", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70751", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70887", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70848", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70826", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70879", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70889", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70769", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70745", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70789", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70805", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70828", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70812", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70797", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00649", "scoring_system": "epss", "scoring_elements": "0.70842", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2213" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951771", "reference_id": "1951771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951771" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2213" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4wz-4cet-p3ch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57033?format=api", "vulnerability_id": "VCID-r6xq-en8s-u3db", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14852", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42764", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42625", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4268", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42745", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14852" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890771", "reference_id": "1890771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890771" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:22Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14852" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r6xq-en8s-u3db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57133?format=api", "vulnerability_id": "VCID-rf1r-a5xx-akb3", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.64986", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65036", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65128", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65107", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65096", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65068", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65105", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65114", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65098", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65116", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65129", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65064", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65025", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389", "reference_id": "1922389", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922389" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246", "reference_id": "RHSA-2020:5246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500", "reference_id": "RHSA-2020:5500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654", "reference_id": "RHSA-2020:5654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663", "reference_id": "RHSA-2020:5663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665", "reference_id": "RHSA-2020:5665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2022" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80399?format=api", "vulnerability_id": "VCID-rr3t-1zsh-b7hm", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76812", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76914", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2203" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951768", "reference_id": "1951768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951768" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2203" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rr3t-1zsh-b7hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80157?format=api", "vulnerability_id": "VCID-sguy-dt9t-ybgk", "summary": "mysql: Server: Locking unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2402", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2402" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992312", "reference_id": "1992312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2402" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sguy-dt9t-ybgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57143?format=api", "vulnerability_id": "VCID-sq21-9e5z-muhb", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27967", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28039", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.2756", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27885", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27875", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27832", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27748", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27637", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.28081", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27876", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27942", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27986", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00101", "scoring_system": "epss", "scoring_elements": "0.27944", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2042" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922397", "reference_id": "1922397", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922397" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "2.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "2.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2042" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sq21-9e5z-muhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80417?format=api", "vulnerability_id": "VCID-suhd-prx3-k7fy", "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2301", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54866", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5487", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5492", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.549", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54875", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54895", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54891", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5486", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5491", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54908", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54903", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54879", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54917", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2301" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951782", "reference_id": "1951782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951782" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2301" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-suhd-prx3-k7fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57046?format=api", "vulnerability_id": "VCID-swdu-cgp2-77e4", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14870", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14870" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890778", "reference_id": "1890778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890778" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:07Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14870" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-swdu-cgp2-77e4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57002?format=api", "vulnerability_id": "VCID-t31g-7742-fqhk", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14786", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74411", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74539", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74442", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74417", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74469", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7446", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74498", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74506", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.74532", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00825", "scoring_system": "epss", "scoring_elements": "0.7454", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14786" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890746", "reference_id": "1890746", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890746" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14786" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t31g-7742-fqhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80142?format=api", "vulnerability_id": "VCID-tb6v-1rdb-m3hv", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2352", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41316", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41408", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41142", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41422", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41442", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.4141", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41395", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41337", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41228", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41222", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41413", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2352" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992297", "reference_id": "1992297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992297" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2352" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tb6v-1rdb-m3hv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80165?format=api", "vulnerability_id": "VCID-tbfj-dfqj-6ff1", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2425", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2425" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992319", "reference_id": "1992319", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992319" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2425" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tbfj-dfqj-6ff1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57157?format=api", "vulnerability_id": "VCID-td7w-db1k-t3g3", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2072", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56822", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.5683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0034", "scoring_system": "epss", "scoring_elements": "0.56816", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2072" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922406", "reference_id": "1922406", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922406" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2072" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-td7w-db1k-t3g3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80398?format=api", "vulnerability_id": "VCID-tdsp-tezp-2qhy", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2202", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81135", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81144", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81271", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81235", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81237", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81265", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81167", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81166", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81194", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81199", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81219", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81205", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01511", "scoring_system": "epss", "scoring_elements": "0.81198", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2202" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951767", "reference_id": "1951767", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951767" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2202" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdsp-tezp-2qhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57154?format=api", "vulnerability_id": "VCID-teu1-w449-fkcx", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2065", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2065" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922404", "reference_id": "1922404", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922404" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2065" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teu1-w449-fkcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57134?format=api", "vulnerability_id": "VCID-tudj-guxj-53ea", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2024", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7041", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70424", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70564", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70489", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70475", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70517", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70525", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70505", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70555", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70441", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70419", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70465", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70504", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2024" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922390", "reference_id": "1922390", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922390" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2024" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tudj-guxj-53ea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57050?format=api", "vulnerability_id": "VCID-tv36-3tsk-uket", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14891", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14891" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890782", "reference_id": "1890782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890782" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:53Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14891" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tv36-3tsk-uket" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80390?format=api", "vulnerability_id": "VCID-unnc-t1ky-c3fx", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2178", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80136", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80267", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.8018", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80188", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80206", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80191", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80184", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80212", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80213", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80215", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80242", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80251", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80163", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01365", "scoring_system": "epss", "scoring_elements": "0.80152", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2178" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951760", "reference_id": "1951760", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951760" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2178" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unnc-t1ky-c3fx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80405?format=api", "vulnerability_id": "VCID-usjz-e1at-vubb", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2217", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76812", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76914", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2217" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951773", "reference_id": "1951773", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951773" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2217" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-usjz-e1at-vubb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57159?format=api", "vulnerability_id": "VCID-uzvh-tvvx-vyer", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2081", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2081" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922416", "reference_id": "1922416", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922416" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2081" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzvh-tvvx-vyer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57006?format=api", "vulnerability_id": "VCID-vap7-ycjn-73d1", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14793", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74705", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.7483", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74735", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74741", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74779", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74749", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74793", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74783", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74819", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00843", "scoring_system": "epss", "scoring_elements": "0.74827", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14793" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890750", "reference_id": "1890750", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890750" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/", "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/", "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/", "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14793" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vap7-ycjn-73d1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80419?format=api", "vulnerability_id": "VCID-vfxa-abgu-9ydp", "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2305", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54194", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2305" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951784", "reference_id": "1951784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951784" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2305" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vfxa-abgu-9ydp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80139?format=api", "vulnerability_id": "VCID-vsrs-874z-7qh7", "summary": "mysql: Server: Memcached unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35794", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35984", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35491", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35837", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35609", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35577", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.36013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35917", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2340" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992279", "reference_id": "1992279", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992279" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2340" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vsrs-874z-7qh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80161?format=api", "vulnerability_id": "VCID-vucs-k62a-xke9", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2418", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2418" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992316", "reference_id": "1992316", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2418" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vucs-k62a-xke9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80141?format=api", "vulnerability_id": "VCID-w8gu-h6z8-wkcx", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63238", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63214", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63224", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.6318", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63197", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2342" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992294", "reference_id": "1992294", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992294" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/", "reference_id": "6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/", "reference_id": "OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2342" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8gu-h6z8-wkcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57124?format=api", "vulnerability_id": "VCID-w93s-7t77-x3fg", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2010", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58354", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58449", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58485", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58508", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58488", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58469", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58501", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58505", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58483", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.5845", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58463", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58458", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58432", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2010" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922383", "reference_id": "1922383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922383" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/", "reference_id": "CS5THZSGI7O2CZO44NWYE57AG2T7NK3K", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210622-0001/", "reference_id": "ntap-20210622-0001", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210622-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/", "reference_id": "T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2010" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w93s-7t77-x3fg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57164?format=api", "vulnerability_id": "VCID-wvxn-ugew-u7bj", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78469", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78602", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78475", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78489", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78516", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78522", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78547", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78529", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78521", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78549", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78548", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78545", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78578", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01154", "scoring_system": "epss", "scoring_elements": "0.78585", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755", "reference_id": "1951755", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428", "reference_id": "988428", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/", "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/" }, { "reference_url": "https://security.archlinux.org/ASA-202105-14", "reference_id": "ASA-202105-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-14" }, { "reference_url": "https://security.archlinux.org/AVG-1882", "reference_id": "AVG-1882", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1882" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/", "reference_id": "DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/", "reference_id": "GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.gentoo.org/glsa/202105-28", "reference_id": "GLSA-202105-28", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://security.gentoo.org/glsa/202105-28" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/", "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/", "reference_id": "PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/", "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" }, { "reference_url": "https://usn.ubuntu.com/5022-3/", "reference_id": "USN-5022-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2166" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80422?format=api", "vulnerability_id": "VCID-xjhs-6sgc-nfhu", "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2308", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35439", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35638", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35198", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35586", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35537", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35298", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35277", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35663", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35544", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3559", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35579", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35556", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35596", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2308" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951786", "reference_id": "1951786", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951786" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2308" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjhs-6sgc-nfhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80402?format=api", "vulnerability_id": "VCID-y3a3-tp5x-nqch", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2212", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76812", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76914", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2212" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951770", "reference_id": "1951770", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951770" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2212" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y3a3-tp5x-nqch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80172?format=api", "vulnerability_id": "VCID-y5nf-6qad-13er", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2444", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34671", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34887", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3444", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34784", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34547", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34527", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34835", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34869", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34831", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34845", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992326", "reference_id": "1992326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2444" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y5nf-6qad-13er" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57049?format=api", "vulnerability_id": "VCID-yf77-atgx-dyh3", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14888", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14888" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890781", "reference_id": "1890781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890781" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:56Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14888" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yf77-atgx-dyh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80160?format=api", "vulnerability_id": "VCID-yr11-2geq-k7aa", "summary": "mysql: Server: GIS unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2579", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25487", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2562", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25592", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25543", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25535", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25832", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25602", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25675", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25721", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25734", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25635", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25636", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2417" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992315", "reference_id": "1992315", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/5022-1/", "reference_id": "USN-5022-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5022-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2417" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yr11-2geq-k7aa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80159?format=api", "vulnerability_id": "VCID-yvkw-q3bp-73d6", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992314", "reference_id": "1992314", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992314" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2412" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yvkw-q3bp-73d6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57150?format=api", "vulnerability_id": "VCID-z7zv-zgw7-n3fj", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2058", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2058" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922401", "reference_id": "1922401", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922401" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795", "reference_id": "980795", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/", "reference_id": "ntap-20210219-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4716-1/", "reference_id": "USN-4716-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4716-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2058" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7zv-zgw7-n3fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80408?format=api", "vulnerability_id": "VCID-zkmv-3qu7-4kee", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2230", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76812", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76962", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76942", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7695", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.7687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00989", "scoring_system": "epss", "scoring_elements": "0.76914", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2230" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951775", "reference_id": "1951775", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951775" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325", "reference_id": "987325", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4952-1/", "reference_id": "USN-4952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4952-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2230" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkmv-3qu7-4kee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57047?format=api", "vulnerability_id": "VCID-zn55-b12v-5fax", "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14873", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42053", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.4214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42268", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00201", "scoring_system": "epss", "scoring_elements": "0.42262", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890779", "reference_id": "1890779", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890779" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623", "reference_id": "972623", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623" }, { "reference_url": "https://security.gentoo.org/glsa/202105-27", "reference_id": "GLSA-202105-27", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:06Z/" } ], "url": "https://security.gentoo.org/glsa/202105-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590", "reference_id": "RHSA-2021:3590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811", "reference_id": "RHSA-2021:3811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3811" }, { "reference_url": "https://usn.ubuntu.com/4604-1/", "reference_id": "USN-4604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4604-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-14873" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zn55-b12v-5fax" } ], "fixing_vulnerabilities": [], "risk_score": "3.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql80-mysql@8.0.26-1%3Farch=el7" }