Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/87350?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/87350?format=api", "purl": "pkg:rpm/redhat/mariadb10.11@3:10.11.15-1?arch=el10_1", "type": "rpm", "namespace": "redhat", "name": "mariadb10.11", "version": "3:10.11.15-1", "qualifiers": { "arch": "el10_1" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70816?format=api", "vulnerability_id": "VCID-3tgc-def7-zufy", "summary": "mariadb: MariaDB Server Crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52971.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52971", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.1568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15739", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19326", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19477", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21263", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24247", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24327", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24571", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2482", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24773", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30031", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52971" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437", "reference_id": "1100437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350917", "reference_id": "2350917", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350917" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32084", "reference_id": "MDEV-32084", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:07Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32084" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-52971" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3tgc-def7-zufy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70815?format=api", "vulnerability_id": "VCID-45ah-27q3-tbbh", "summary": "mariadb: MariaDB Server Crash Due to Empty Backtrace Log", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52969.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52969", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43348", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47684", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56598", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56504", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00397", "scoring_system": "epss", "scoring_elements": "0.60574", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63455", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64049", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64037", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64035", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437", "reference_id": "1100437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350916", "reference_id": "2350916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350916" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32083", "reference_id": "MDEV-32083", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T15:57:59Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32083" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-52969" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45ah-27q3-tbbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70817?format=api", "vulnerability_id": "VCID-7awt-vh1g-3fdj", "summary": "mariadb: MariaDB Server Crash via Item_direct_view_ref", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-52970.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52970", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43348", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47684", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00244", "scoring_system": "epss", "scoring_elements": "0.47693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00254", "scoring_system": "epss", "scoring_elements": "0.48738", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56598", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56504", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63455", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64049", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64037", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64035", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437", "reference_id": "1100437", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350918", "reference_id": "2350918", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350918" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-32086", "reference_id": "MDEV-32086", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T14:51:41Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-32086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2023-52970" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7awt-vh1g-3fdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70374?format=api", "vulnerability_id": "VCID-9c35-pmbb-efe9", "summary": "mysql: mariadb: InnoDB unspecified vulnerability (CPU Apr 2025)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30693", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51469", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51415", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51467", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58582", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58586", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58571", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58537", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58609", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58622", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58627", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00366", "scoring_system": "epss", "scoring_elements": "0.58573", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385", "reference_id": "1103385", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976", "reference_id": "1105976", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359963", "reference_id": "2359963", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359963" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2025.html", "reference_id": "cpuapr2025.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:23:08Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15699", "reference_id": "RHSA-2025:15699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16046", "reference_id": "RHSA-2025:16046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16086", "reference_id": "RHSA-2025:16086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16861", "reference_id": "RHSA-2025:16861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7479-1/", "reference_id": "USN-7479-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7479-1/" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-30693" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9c35-pmbb-efe9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70364?format=api", "vulnerability_id": "VCID-a732-u6ue-57h5", "summary": "mysql: mariadb: mysqldump unspecified vulnerability (CPU Apr 2025)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30722", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56588", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56649", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56586", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56604", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56587", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56542", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.5665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56693", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56678", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57084", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57136", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385", "reference_id": "1103385", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976", "reference_id": "1105976", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359885", "reference_id": "2359885", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359885" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2025.html", "reference_id": "cpuapr2025.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-17T13:37:19Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2025.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15699", "reference_id": "RHSA-2025:15699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16046", "reference_id": "RHSA-2025:16046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16086", "reference_id": "RHSA-2025:16086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:16861", "reference_id": "RHSA-2025:16861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:16861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19572", "reference_id": "RHSA-2025:19572", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19584", "reference_id": "RHSA-2025:19584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7479-1/", "reference_id": "USN-7479-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7479-1/" }, { "reference_url": "https://usn.ubuntu.com/7519-1/", "reference_id": "USN-7519-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7519-1/" }, { "reference_url": "https://usn.ubuntu.com/7548-1/", "reference_id": "USN-7548-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7548-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-30722" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a732-u6ue-57h5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64967?format=api", "vulnerability_id": "VCID-sawk-emag-1ygs", "summary": "mysql: Optimizer unspecified vulnerability (CPU Jan 2026)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21968.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21968.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21968", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20576", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20228", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2028", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20245", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20154", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20634", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20361", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20443", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.205", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20523", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20479", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20414", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20285", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21968" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115", "reference_id": "1126115", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431409", "reference_id": "2431409", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431409" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2026.html", "reference_id": "cpujan2026.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T19:20:23Z/" } ], "url": "https://www.oracle.com/security-alerts/cpujan2026.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4162", "reference_id": "RHSA-2026:4162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4828", "reference_id": "RHSA-2026:4828", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5580", "reference_id": "RHSA-2026:5580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5640", "reference_id": "RHSA-2026:5640", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5640" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6391", "reference_id": "RHSA-2026:6391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6435", "reference_id": "RHSA-2026:6435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6435" }, { "reference_url": "https://usn.ubuntu.com/7994-1/", "reference_id": "USN-7994-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7994-1/" }, { "reference_url": "https://usn.ubuntu.com/8006-1/", "reference_id": "USN-8006-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8006-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2026-21968" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sawk-emag-1ygs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66421?format=api", "vulnerability_id": "VCID-ttzx-uwaj-8uek", "summary": "mariadb: MariaDB: mariadb-dump utility vulnerable to remote code execution via improper path validation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13699.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13699.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13699", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29822", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29957", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29887", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29752", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36315", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36299", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36247", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40626", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43647", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43666", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43654", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00211", "scoring_system": "epss", "scoring_elements": "0.43591", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417693", "reference_id": "2417693", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417693" }, { "reference_url": "https://jira.mariadb.org/browse/MDEV-37483", "reference_id": "MDEV-37483", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-24T16:10:37Z/" } ], "url": "https://jira.mariadb.org/browse/MDEV-37483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0061", "reference_id": "RHSA-2026:0061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0111", "reference_id": "RHSA-2026:0111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0112", "reference_id": "RHSA-2026:0112", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0136", "reference_id": "RHSA-2026:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0137", "reference_id": "RHSA-2026:0137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0137" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0225", "reference_id": "RHSA-2026:0225", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0225" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0232", "reference_id": "RHSA-2026:0232", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0232" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0233", "reference_id": "RHSA-2026:0233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0247", "reference_id": "RHSA-2026:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0295", "reference_id": "RHSA-2026:0295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0296", "reference_id": "RHSA-2026:0296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0304", "reference_id": "RHSA-2026:0304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0333", "reference_id": "RHSA-2026:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0334", "reference_id": "RHSA-2026:0334", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0335", "reference_id": "RHSA-2026:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0336", "reference_id": "RHSA-2026:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0344", "reference_id": "RHSA-2026:0344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0351", "reference_id": "RHSA-2026:0351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0357", "reference_id": "RHSA-2026:0357", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0357" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0367", "reference_id": "RHSA-2026:0367", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0367" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0376", "reference_id": "RHSA-2026:0376", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0698", "reference_id": "RHSA-2026:0698", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0698" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8812", "reference_id": "RHSA-2026:8812", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8812" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8813", "reference_id": "RHSA-2026:8813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8813" }, { "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1025/", "reference_id": "ZDI-25-1025", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-24T16:10:37Z/" } ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-1025/" } ], "fixed_packages": [], "aliases": [ "CVE-2025-13699" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ttzx-uwaj-8uek" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mariadb10.11@3:10.11.15-1%3Farch=el10_1" }