{"url":"http://public2.vulnerablecode.io/api/packages/178981?format=json","purl":"pkg:maven/mysql/mysql-connector-java@6.0.2","type":"maven","namespace":"mysql","name":"mysql-connector-java","version":"6.0.2","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/9951?format=json","vulnerability_id":"VCID-7v7q-8wa6-hff5","summary":"Improper Access Control\nA vulnerability in the MySQL Connectors component of Oracle MySQL exists. Successful attacks of this vulnerability can result in takeover of MySQL Connectors.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1545","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1545"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3258.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3258.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3258","reference_id":"","reference_type":"","scores":[{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88639","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88667","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88611","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88646","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88652","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88592","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88669","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88662","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88648","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04126","scoring_system":"epss","scoring_elements":"0.88609","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3258"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20181018-0002","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20181018-0002"},{"reference_url":"https://security.netapp.com/advisory/ntap-20181018-0002/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20181018-0002/"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/105589","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/"}],"url":"http://www.securityfocus.com/bid/105589"},{"reference_url":"http://www.securitytracker.com/id/1041888","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:07Z/"}],"url":"http://www.securitytracker.com/id/1041888"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1640615","reference_id":"1640615","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1640615"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3258","reference_id":"CVE-2018-3258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3258"},{"reference_url":"https://github.com/advisories/GHSA-4vrv-ch96-6h42","reference_id":"GHSA-4vrv-ch96-6h42","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-4vrv-ch96-6h42"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4366","reference_id":"RHSA-2020:4366","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4366"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/32011?format=json","purl":"pkg:maven/mysql/mysql-connector-java@8.0.13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-28f6-ud4w-aug9"},{"vulnerability":"VCID-4w4j-hadb-w3e6"},{"vulnerability":"VCID-e37q-8shh-v7aw"},{"vulnerability":"VCID-ht8v-kvcr-77ds"},{"vulnerability":"VCID-u33b-3n5s-4qfv"},{"vulnerability":"VCID-xap5-du1j-c7ed"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@8.0.13"}],"aliases":["CVE-2018-3258","GHSA-4vrv-ch96-6h42"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7v7q-8wa6-hff5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/12225?format=json","vulnerability_id":"VCID-e37q-8shh-v7aw","summary":"Unknown Vulnerability\nVulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21363.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21363","reference_id":"","reference_type":"","scores":[{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77125","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77166","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77167","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77159","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77194","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77069","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.7715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77129","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21363"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2022.html","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T17:38:01Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2047343","reference_id":"2047343","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2047343"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21363","reference_id":"CVE-2022-21363","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21363"},{"reference_url":"https://github.com/advisories/GHSA-g76j-4cxx-23h9","reference_id":"GHSA-g76j-4cxx-23h9","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-g76j-4cxx-23h9"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4623","reference_id":"RHSA-2022:4623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4623"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4918","reference_id":"RHSA-2022:4918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4919","reference_id":"RHSA-2022:4919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4922","reference_id":"RHSA-2022:4922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5532","reference_id":"RHSA-2022:5532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5532"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/43512?format=json","purl":"pkg:maven/mysql/mysql-connector-java@8.0.28","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-xap5-du1j-c7ed"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@8.0.28"}],"aliases":["CVE-2022-21363","GHSA-g76j-4cxx-23h9"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e37q-8shh-v7aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/10596?format=json","vulnerability_id":"VCID-ht8v-kvcr-77ds","summary":"Improper Input Validation\nDifficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and can result in takeover of MySQL Connectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2692.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2692.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2692","reference_id":"","reference_type":"","scores":[{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77213","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77192","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77165","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77123","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77061","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01012","scoring_system":"epss","scoring_elements":"0.77121","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-2692"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190423-0002","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20190423-0002"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190423-0002/","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190423-0002/"},{"reference_url":"https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:48Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"http://www.securityfocus.com/bid/107925","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:48Z/"}],"url":"http://www.securityfocus.com/bid/107925"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1703402","reference_id":"1703402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1703402"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2692","reference_id":"CVE-2019-2692","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-2692"},{"reference_url":"https://github.com/advisories/GHSA-jcq3-cprp-m333","reference_id":"GHSA-jcq3-cprp-m333","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-jcq3-cprp-m333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5568","reference_id":"RHSA-2020:5568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5568"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/36213?format=json","purl":"pkg:maven/mysql/mysql-connector-java@8.0.16","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-28f6-ud4w-aug9"},{"vulnerability":"VCID-4w4j-hadb-w3e6"},{"vulnerability":"VCID-e37q-8shh-v7aw"},{"vulnerability":"VCID-xap5-du1j-c7ed"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@8.0.16"}],"aliases":["CVE-2019-2692","GHSA-jcq3-cprp-m333"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ht8v-kvcr-77ds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19502?format=json","vulnerability_id":"VCID-xap5-du1j-c7ed","summary":"Improper Access Control\nVulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22102.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22102","reference_id":"","reference_type":"","scores":[{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.8763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87632","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87625","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87601","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.8759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03493","scoring_system":"epss","scoring_elements":"0.87549","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22102"},{"reference_url":"https://github.com/mysql/mysql-connector-j","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"8.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/mysql/mysql-connector-j"},{"reference_url":"https://github.com/mysql/mysql-connector-j/compare/8.1.0...8.2.0","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"8.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/mysql/mysql-connector-j/compare/8.1.0...8.2.0"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0007","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"8.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20231027-0007"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0007/","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T15:27:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0007/"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2023.html","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"8.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T15:27:01Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2023.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256474","reference_id":"2256474","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2256474"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22102","reference_id":"CVE-2023-22102","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"8.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22102"},{"reference_url":"https://github.com/advisories/GHSA-m6vm-37g8-gqvh","reference_id":"GHSA-m6vm-37g8-gqvh","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-m6vm-37g8-gqvh"}],"fixed_packages":[],"aliases":["CVE-2023-22102","GHSA-m6vm-37g8-gqvh"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xap5-du1j-c7ed"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/mysql/mysql-connector-java@6.0.2"}