{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","type":"deb","namespace":"debian","name":"mysql-8.0","version":"8.0.45-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.0.46-1","latest_non_vulnerable_version":"8.0.46-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74831?format=json","vulnerability_id":"VCID-1112-upr2-bufc","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21173.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21173.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21173","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40406","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40432","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40407","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40419","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40429","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40399","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40323","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21173"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298350","reference_id":"2298350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298350"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T15:36:36Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21173"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1112-upr2-bufc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56998?format=json","vulnerability_id":"VCID-11tt-44je-dfg8","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14775","reference_id":"","reference_type":"","scores":[{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80644","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.8067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80724","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80768","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14775"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890784","reference_id":"1890784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890784"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14775"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-11tt-44je-dfg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79981?format=json","vulnerability_id":"VCID-129c-q69g-nkbu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35636","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35636"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016124","reference_id":"2016124","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016124"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35636"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-129c-q69g-nkbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79793?format=json","vulnerability_id":"VCID-13v8-wt9t-8kcs","summary":"mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21362","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48243","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21362"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043641","reference_id":"2043641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043641"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21362"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13v8-wt9t-8kcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78005?format=json","vulnerability_id":"VCID-16fb-js2y-8yc6","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22059.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22059.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22059","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48462","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48564","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48522","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48516","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48508","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48515","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48533","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48506","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48569","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22059"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245015","reference_id":"2245015","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245015"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22059"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-16fb-js2y-8yc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79973?format=json","vulnerability_id":"VCID-1748-hmbg-hbhk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35628","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35628"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016114","reference_id":"2016114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016114"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35628"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1748-hmbg-hbhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57023?format=json","vulnerability_id":"VCID-187q-sxxu-zyh5","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14836","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70564","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70505","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70504","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890763","reference_id":"1890763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890763"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:40Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14836"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-187q-sxxu-zyh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80385?format=json","vulnerability_id":"VCID-1b6h-r8cr-7be7","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2169","reference_id":"","reference_type":"","scores":[{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82369","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82451","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82397","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2169"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951756","reference_id":"1951756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951756"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2169"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6h-r8cr-7be7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77829?format=json","vulnerability_id":"VCID-1df8-99y1-z3b1","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20973","reference_id":"","reference_type":"","scores":[{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43142","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43349","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43219","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4331","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43346","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43314","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43298","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4336","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20973"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258784","reference_id":"2258784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258784"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T20:36:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20973"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1df8-99y1-z3b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78021?format=json","vulnerability_id":"VCID-1fdz-twax-fybv","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22112.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22112.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22112","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22112"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245031","reference_id":"2245031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22112"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1fdz-twax-fybv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78017?format=json","vulnerability_id":"VCID-1hh9-am1z-rqf1","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22103.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22103.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22103","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22103"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245027","reference_id":"2245027","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245027"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T21:12:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22103"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1hh9-am1z-rqf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78743?format=json","vulnerability_id":"VCID-1jm9-vjfe-skgu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21870.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21870","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26578","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21870"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162277","reference_id":"2162277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21870"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1jm9-vjfe-skgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80391?format=json","vulnerability_id":"VCID-1muw-xrgz-uub8","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2179","reference_id":"","reference_type":"","scores":[{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82369","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82451","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82397","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2179"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951761","reference_id":"1951761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951761"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2179"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1muw-xrgz-uub8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71971?format=json","vulnerability_id":"VCID-1nrb-rkfk-skcs","summary":"mysql: MySQL Server: Denial of Service vulnerability via network access by a high privileged attacker","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21525.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21525","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24425","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21525"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339259","reference_id":"2339259","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339259"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:29:57Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21525"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1nrb-rkfk-skcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66842?format=json","vulnerability_id":"VCID-1qsj-djg4-cfeg","summary":"mysql: Optimizer unspecified vulnerability (CPU Oct 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53040.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53040.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53040","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14342","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53040"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543","reference_id":"1118543","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405534","reference_id":"2405534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405534"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T14:30:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23008","reference_id":"RHSA-2025:23008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23109","reference_id":"RHSA-2025:23109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23111","reference_id":"RHSA-2025:23111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23134","reference_id":"RHSA-2025:23134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23137","reference_id":"RHSA-2025:23137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23137"},{"reference_url":"https://usn.ubuntu.com/7873-1/","reference_id":"USN-7873-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7873-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931427?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.44-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.44-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53040"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1qsj-djg4-cfeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73612?format=json","vulnerability_id":"VCID-1uaf-g9j6-b7aq","summary":"mysql: Optimizer unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21241.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21241","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33894","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43049","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21241"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318870","reference_id":"2318870","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318870"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21241"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1uaf-g9j6-b7aq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71961?format=json","vulnerability_id":"VCID-1un6-p5ex-9kfg","summary":"mysql: Denial of Service Vulnerability in MySQL Server Optimizer","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21566.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21566.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21566","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42989","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4282","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42902","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42903","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43002","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43015","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43038","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42986","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.43034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4297","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21566"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339273","reference_id":"2339273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339273"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-22T14:58:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21566"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1un6-p5ex-9kfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57040?format=json","vulnerability_id":"VCID-1vkz-z2pq-nbat","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14861","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14861"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890773","reference_id":"1890773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:15Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14861"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vkz-z2pq-nbat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57009?format=json","vulnerability_id":"VCID-1vm5-s57q-5fh7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14800","reference_id":"","reference_type":"","scores":[{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.5534","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55415","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55515","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55442","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55506","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55507","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55516","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55495","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890753","reference_id":"1890753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890753"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:14Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14800"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vm5-s57q-5fh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78755?format=json","vulnerability_id":"VCID-22uu-xxpk-37av","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21882.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21882.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21882","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23789","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23841","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23981","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23963","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21882"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162289","reference_id":"2162289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21882"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-22uu-xxpk-37av"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79991?format=json","vulnerability_id":"VCID-259b-q1uk-vyap","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35646","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54844","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54863","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54822","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016135","reference_id":"2016135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016135"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35646"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-259b-q1uk-vyap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57010?format=json","vulnerability_id":"VCID-26c7-8j5m-pygt","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14804","reference_id":"","reference_type":"","scores":[{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58885","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.5896","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59026","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59023","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59027","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59005","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59006","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14804"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890754","reference_id":"1890754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890754"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:09Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14804"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26c7-8j5m-pygt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78496?format=json","vulnerability_id":"VCID-294p-669y-myd8","summary":"mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21962.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21962","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21962"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188125","reference_id":"2188125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188125"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21962"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-294p-669y-myd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64963?format=json","vulnerability_id":"VCID-29aj-nrwb-nqes","summary":"mysql: Optimizer unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21941.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21941.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21941","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14977","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21941"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115","reference_id":"1126115","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431384","reference_id":"2431384","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431384"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:58:17Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4162","reference_id":"RHSA-2026:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4828","reference_id":"RHSA-2026:4828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5580","reference_id":"RHSA-2026:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5640","reference_id":"RHSA-2026:5640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6391","reference_id":"RHSA-2026:6391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6391"},{"reference_url":"https://usn.ubuntu.com/7994-1/","reference_id":"USN-7994-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7994-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21941"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29aj-nrwb-nqes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57140?format=json","vulnerability_id":"VCID-29k9-yssc-jbec","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2036","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2036"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922395","reference_id":"1922395","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922395"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2036"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29k9-yssc-jbec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78497?format=json","vulnerability_id":"VCID-2aa4-79kv-ruge","summary":"mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21963.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21963.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21963","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21132","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21313","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21393","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21362","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21304","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21963"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188126","reference_id":"2188126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188126"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21963"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2aa4-79kv-ruge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78747?format=json","vulnerability_id":"VCID-2fsg-vrnf-n7ff","summary":"mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21874.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21874.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21874","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1556","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15599","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15759","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15706","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15673","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15574","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.155","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15508","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21874"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162281","reference_id":"2162281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21874"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsg-vrnf-n7ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57145?format=json","vulnerability_id":"VCID-2fyj-vfka-g3fc","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2046","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922398","reference_id":"1922398","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922398"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2046"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2fyj-vfka-g3fc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57151?format=json","vulnerability_id":"VCID-2hqz-t746-57bt","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2060","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2060"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922402","reference_id":"1922402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922402"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2060"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hqz-t746-57bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79222?format=json","vulnerability_id":"VCID-2jks-ehmr-73aj","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21534","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21534"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115294","reference_id":"2115294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21534"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2jks-ehmr-73aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68629?format=json","vulnerability_id":"VCID-2n43-8e5n-xkap","summary":"mysql: Replication unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53023.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53023.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53023","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23207","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23229","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23217","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23434","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23428","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2341","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53023"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380311","reference_id":"2380311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380311"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-15T20:31:50Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53023"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2n43-8e5n-xkap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76855?format=json","vulnerability_id":"VCID-2nqb-85ye-zbe3","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21049.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21049.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21049","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27715","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27986","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27903","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28024","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28135","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28142","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28098","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28041","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2805","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21049"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275437","reference_id":"2275437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275437"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:45:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0012/","reference_id":"ntap-20240426-0012","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:45:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21049"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nqb-85ye-zbe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78936?format=json","vulnerability_id":"VCID-2pmu-2dwp-mba2","summary":"mysql: Server: Replication unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21633.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21633.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21633","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2183","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21559","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21553","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2182","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21633"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142873","reference_id":"2142873","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142873"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21633"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pmu-2dwp-mba2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68636?format=json","vulnerability_id":"VCID-2qww-9kjz-73ea","summary":"mysql: Encryption unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50097.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50097.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50097","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50097"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380308","reference_id":"2380308","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380308"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:10:33Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50097"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2qww-9kjz-73ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68651?format=json","vulnerability_id":"VCID-2rt1-pf65-z3ek","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50084.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50084.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50084","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29724","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29771","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3005","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30029","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29984","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50084"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380321","reference_id":"2380321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380321"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T19:46:01Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50084"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2rt1-pf65-z3ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80143?format=json","vulnerability_id":"VCID-2sc2-r3y9-37as","summary":"mysql: Server: Federated unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2354","reference_id":"","reference_type":"","scores":[{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58105","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5819","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5826","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58237","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58227","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58204","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58238","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992298","reference_id":"1992298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992298"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2354"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2sc2-r3y9-37as"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80145?format=json","vulnerability_id":"VCID-2sdk-9wte-n7ct","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2357","reference_id":"","reference_type":"","scores":[{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59643","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59796","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59789","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59778","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59762","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2357"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992300","reference_id":"1992300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992300"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2357"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2sdk-9wte-n7ct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57017?format=json","vulnerability_id":"VCID-2sfw-7k8u-1fbk","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14827","reference_id":"","reference_type":"","scores":[{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63748","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63809","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63863","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63872","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63878","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.6389","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00455","scoring_system":"epss","scoring_elements":"0.63861","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14827"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890759","reference_id":"1890759","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890759"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14827"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2sfw-7k8u-1fbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76859?format=json","vulnerability_id":"VCID-2u2z-cas8-8ya3","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21053.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21053","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27486","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27336","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27529","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27641","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27646","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27601","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27544","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27552","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21053"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275441","reference_id":"2275441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275441"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T15:46:02Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0012/","reference_id":"ntap-20240426-0012","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T15:46:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21053"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2u2z-cas8-8ya3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80381?format=json","vulnerability_id":"VCID-2uvf-vapz-8ud5","summary":"mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2162.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2162.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2162","reference_id":"","reference_type":"","scores":[{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70164","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70176","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70278","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.7031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70318","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.7017","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70217","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.7024","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70227","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70269","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2162"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951753","reference_id":"1951753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951753"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2162"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2uvf-vapz-8ud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73632?format=json","vulnerability_id":"VCID-2x29-qua3-hqhn","summary":"mysql: DML unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21219.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21219.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21219","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33469","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33448","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33978","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33863","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33861","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39149","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21219"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318897","reference_id":"2318897","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318897"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21219"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2x29-qua3-hqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57014?format=json","vulnerability_id":"VCID-2ytu-hw3r-ffc8","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14814","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14814"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890757","reference_id":"1890757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890757"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:00Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14814"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytu-hw3r-ffc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57051?format=json","vulnerability_id":"VCID-2zv1-9c2g-fkdq","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14893","reference_id":"","reference_type":"","scores":[{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52483","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52544","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52603","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52628","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52635","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52571","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52569","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5262","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14893"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890783","reference_id":"1890783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890783"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14893"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2zv1-9c2g-fkdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80146?format=json","vulnerability_id":"VCID-31vn-exfm-kuh2","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2367","reference_id":"","reference_type":"","scores":[{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63197","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992301","reference_id":"1992301","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992301"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2367"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-31vn-exfm-kuh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79960?format=json","vulnerability_id":"VCID-34tb-1r12-kbe9","summary":"mysql: C API unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35597","reference_id":"","reference_type":"","scores":[{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71378","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71386","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.7142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71438","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71421","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71467","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71472","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71503","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.7151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71379","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35597"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016099","reference_id":"2016099","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016099"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0005/","reference_id":"ntap-20211022-0005","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35597"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-34tb-1r12-kbe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79976?format=json","vulnerability_id":"VCID-35tu-zc9b-j7dd","summary":"mysql: Server: GIS unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35631","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35631"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016118","reference_id":"2016118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016118"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35631"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-35tu-zc9b-j7dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79962?format=json","vulnerability_id":"VCID-36fa-z98h-3yfk","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35604","reference_id":"","reference_type":"","scores":[{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42962","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43022","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42858","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43049","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43036","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43071","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.4308","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42938","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42939","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016101","reference_id":"2016101","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016101"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/","reference_id":"2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1007","reference_id":"RHSA-2022:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1010","reference_id":"RHSA-2022:1010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1556","reference_id":"RHSA-2022:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1557","reference_id":"RHSA-2022:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4818","reference_id":"RHSA-2022:4818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://usn.ubuntu.com/5123-2/","reference_id":"USN-5123-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-2/"},{"reference_url":"https://usn.ubuntu.com/5170-1/","reference_id":"USN-5170-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5170-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/","reference_id":"VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35604"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78018?format=json","vulnerability_id":"VCID-379y-9g2h-ukhm","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22104.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22104","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07639","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07595","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.076","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08375","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22104"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245028","reference_id":"2245028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245028"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:54:45Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22104"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-379y-9g2h-ukhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97211?format=json","vulnerability_id":"VCID-37kg-raqg-2ugz","summary":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: ndbcluster/plugin DDL). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35584","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51406","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51503","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51481","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5144","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51356","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51444","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51487","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51465","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51495","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35584"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35584"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-37kg-raqg-2ugz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70372?format=json","vulnerability_id":"VCID-37vz-8emu-e3hc","summary":"mysql: PS unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30696.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30696","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30696"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359930","reference_id":"2359930","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359930"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:15:20Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30696"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-37vz-8emu-e3hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74818?format=json","vulnerability_id":"VCID-38r7-2t21-bfd9","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21130.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21130","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40406","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40432","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40407","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40419","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40429","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40399","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40323","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21130"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298315","reference_id":"2298315","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298315"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T16:33:21Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21130"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38r7-2t21-bfd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79780?format=json","vulnerability_id":"VCID-39ju-7pvp-hqbv","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21278","reference_id":"","reference_type":"","scores":[{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62388","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62493","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.6248","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62487","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62479","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62496","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.6245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62469","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62459","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62436","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21278"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043628","reference_id":"2043628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043628"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21278"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39ju-7pvp-hqbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78924?format=json","vulnerability_id":"VCID-39xf-9may-73az","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21594.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21594","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21594"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142861","reference_id":"2142861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142861"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21594"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39xf-9may-73az"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74823?format=json","vulnerability_id":"VCID-3d67-zm6p-v3c7","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21157.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21157.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21157","reference_id":"","reference_type":"","scores":[{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49258","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.4926","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49287","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.4924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49294","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49291","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49288","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49332","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21157"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298335","reference_id":"2298335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298335"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:58:29Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21157"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3d67-zm6p-v3c7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64969?format=json","vulnerability_id":"VCID-3gfg-r2x4-akb3","summary":"mysql: Parser unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21929.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21929","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16422","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16466","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16531","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16539","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21929"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431422","reference_id":"2431422","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431422"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:53:29Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21929"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3gfg-r2x4-akb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97212?format=json","vulnerability_id":"VCID-3h8k-bmwq-4uam","summary":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35613","reference_id":"","reference_type":"","scores":[{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72621","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72708","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72749","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72758","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72613","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.7269","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72663","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72705","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0073","scoring_system":"epss","scoring_elements":"0.72716","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35613"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35613"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3h8k-bmwq-4uam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78490?format=json","vulnerability_id":"VCID-3hz9-teg3-3ubj","summary":"mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21940.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21940.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21940","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21940"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188119","reference_id":"2188119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21940"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3hz9-teg3-3ubj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57147?format=json","vulnerability_id":"VCID-3k3d-296j-kycn","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2055","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2055"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922400","reference_id":"1922400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922400"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2055"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3k3d-296j-kycn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79980?format=json","vulnerability_id":"VCID-3kv6-pbgg-c3au","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35635","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35635"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016122","reference_id":"2016122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016122"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:14Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35635"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3kv6-pbgg-c3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70388?format=json","vulnerability_id":"VCID-3n26-2p6c-6qat","summary":"mysql: Options unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21579.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21579.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21579","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21579"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359938","reference_id":"2359938","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359938"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T20:31:04Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21579"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3n26-2p6c-6qat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79990?format=json","vulnerability_id":"VCID-3qju-u4f8-6ybw","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35645","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35645"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016134","reference_id":"2016134","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016134"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35645"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qju-u4f8-6ybw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77834?format=json","vulnerability_id":"VCID-3tkk-bpmr-yygk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20978","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44238","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44325","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20978"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258789","reference_id":"2258789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20978"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3tkk-bpmr-yygk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57139?format=json","vulnerability_id":"VCID-3v1d-x9yt-3fbb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2032","reference_id":"","reference_type":"","scores":[{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48776","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48844","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4889","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4885","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48838","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48847","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4884","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48795","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48836","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2032"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922394","reference_id":"1922394","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922394"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2032"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3v1d-x9yt-3fbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78023?format=json","vulnerability_id":"VCID-3v27-puhg-tudv","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22114.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22114.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22114","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22114"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245033","reference_id":"2245033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22114"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3v27-puhg-tudv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79210?format=json","vulnerability_id":"VCID-3w7d-u3hs-x7fr","summary":"mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21455","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55495","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55514","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55497","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55537","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58048","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58083","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58049","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58063","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21455"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115282","reference_id":"2115282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21455"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3w7d-u3hs-x7fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80147?format=json","vulnerability_id":"VCID-3wz3-pm9w-vkd7","summary":"mysql: Server: DML unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2370","reference_id":"","reference_type":"","scores":[{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63197","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2370"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992302","reference_id":"1992302","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992302"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2370"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3wz3-pm9w-vkd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68631?format=json","vulnerability_id":"VCID-3xyg-427t-ufaj","summary":"mysql: LDAP Auth unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50103.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50103.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50103","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20877","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22513","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22514","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22809","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2273","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22685","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50103"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380268","reference_id":"2380268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380268"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:03:58Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50103"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xyg-427t-ufaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80156?format=json","vulnerability_id":"VCID-3ye4-pp2j-nkcy","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2399","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2399"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992311","reference_id":"1992311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992311"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2399"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ye4-pp2j-nkcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79492?format=json","vulnerability_id":"VCID-3zjk-18aa-9kbk","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21413","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21413"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082637","reference_id":"2082637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082637"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21413"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3zjk-18aa-9kbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74824?format=json","vulnerability_id":"VCID-414d-z35c-ubdq","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21159.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21159.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21159","reference_id":"","reference_type":"","scores":[{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.499","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49939","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49954","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49946","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49965","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49979","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00265","scoring_system":"epss","scoring_elements":"0.49981","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21159"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298337","reference_id":"2298337","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298337"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:48:52Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21159"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-414d-z35c-ubdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73638?format=json","vulnerability_id":"VCID-49pm-zq8j-zkcp","summary":"mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21212.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21212","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36541","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36662","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.37048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.37081","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36972","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36889","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21212"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318886","reference_id":"2318886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318886"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21212"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49pm-zq8j-zkcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80397?format=json","vulnerability_id":"VCID-4c8x-j238-bbgz","summary":"mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2201","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2201"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951766","reference_id":"1951766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951766"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2201"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4c8x-j238-bbgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78741?format=json","vulnerability_id":"VCID-4cc4-gy7g-8kb9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21868.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21868","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32782","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3248","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32364","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32639","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3265","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32634","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21868"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162275","reference_id":"2162275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21868"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4cc4-gy7g-8kb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79968?format=json","vulnerability_id":"VCID-4d3p-r6am-xucc","summary":"mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35623","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29144","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29483","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29437","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29209","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29589","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2951","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35623"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016109","reference_id":"2016109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016109"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35623"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4d3p-r6am-xucc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79784?format=json","vulnerability_id":"VCID-4dc2-2bx4-uke7","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21303","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51331","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51359","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51366","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51311","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51308","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21303"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043632","reference_id":"2043632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043632"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"},{"reference_url":"https://usn.ubuntu.com/5270-2/","reference_id":"USN-5270-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21303"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4dc2-2bx4-uke7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57146?format=json","vulnerability_id":"VCID-4fdf-ne4n-wyc2","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2048","reference_id":"","reference_type":"","scores":[{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54405","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54481","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54467","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54513","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5453","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54532","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54503","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54472","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54519","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54531","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2048"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922399","reference_id":"1922399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922399"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2048"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fdf-ne4n-wyc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71966?format=json","vulnerability_id":"VCID-4fyr-htgz-ekbm","summary":"mysql: MySQL Server: Unauthorized Data Modification and Read Access Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21540.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21540.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21540","reference_id":"","reference_type":"","scores":[{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36896","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36863","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37304","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37134","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37175","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37176","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3712","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21540"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339238","reference_id":"2339238","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339238"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:21:10Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21540"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fyr-htgz-ekbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79983?format=json","vulnerability_id":"VCID-4jnd-s39x-a3e5","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35638","reference_id":"","reference_type":"","scores":[{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60637","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60711","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60787","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60809","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60781","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60795","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6077","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60794","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60761","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35638"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016127","reference_id":"2016127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016127"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35638"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4jnd-s39x-a3e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57003?format=json","vulnerability_id":"VCID-4msq-13an-d7cb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14789","reference_id":"","reference_type":"","scores":[{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76541","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76678","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76636","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76666","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890747","reference_id":"1890747","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890747"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/","reference_id":"JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/","reference_id":"OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14789"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80415?format=json","vulnerability_id":"VCID-4qkm-twqk-nud6","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2300","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2300"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951781","reference_id":"1951781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951781"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2300"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4qkm-twqk-nud6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57042?format=json","vulnerability_id":"VCID-4qvq-j6yh-ckbf","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14866","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14866"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890774","reference_id":"1890774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890774"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:13Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14866"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-j6yh-ckbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78272?format=json","vulnerability_id":"VCID-4rwn-re96-xuct","summary":"mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22048.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22048.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22048","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23275","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23497","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2351","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23502","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23482","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23287","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23675","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23455","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22048"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224217","reference_id":"2224217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224217"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22048"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4rwn-re96-xuct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71973?format=json","vulnerability_id":"VCID-4svk-dd8j-bub9","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21523.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21523.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21523","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2725","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27431","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27326","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27731","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27637","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27535","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27544","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27516","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27477","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21523"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339304","reference_id":"2339304","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339304"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T14:37:31Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21523"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4svk-dd8j-bub9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68628?format=json","vulnerability_id":"VCID-4t76-7xur-z3hk","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53032.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53032.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53032","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23207","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23229","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23217","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23434","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23428","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2341","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53032"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380266","reference_id":"2380266","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380266"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-15T20:18:51Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53032"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4t76-7xur-z3hk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70392?format=json","vulnerability_id":"VCID-4vnx-j46d-xucm","summary":"mysql: Parser unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21574.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21574.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21574","reference_id":"","reference_type":"","scores":[{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51823","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51859","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51864","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.5181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51863","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51916","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51898","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51882","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51925","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51932","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51913","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21574"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359902","reference_id":"2359902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359902"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:42:20Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21574"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4vnx-j46d-xucm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79986?format=json","vulnerability_id":"VCID-4wes-5yrc-wkcc","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35641","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016130","reference_id":"2016130","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016130"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35641"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4wes-5yrc-wkcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70381?format=json","vulnerability_id":"VCID-4zd5-ybk5-b7aj","summary":"mysql: Replication unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30684.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30684.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30684","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30684"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359972","reference_id":"2359972","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359972"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T18:04:03Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30684"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zd5-ybk5-b7aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57119?format=json","vulnerability_id":"VCID-4zfz-7zkz-e7hn","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2002","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34706","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34896","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34859","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34875","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34814","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3494","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2002"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922380","reference_id":"1922380","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922380"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2002"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zfz-7zkz-e7hn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80387?format=json","vulnerability_id":"VCID-4zyv-b7d8-t7ec","summary":"mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2171","reference_id":"","reference_type":"","scores":[{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76479","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76493","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76519","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76532","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76536","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76524","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76558","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76447","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2171"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951758","reference_id":"1951758","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951758"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2171"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zyv-b7d8-t7ec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80409?format=json","vulnerability_id":"VCID-537e-defy-1qgh","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2232","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30015","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30119","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30083","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2232"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951776","reference_id":"1951776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951776"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2232"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-537e-defy-1qgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79213?format=json","vulnerability_id":"VCID-5587-7c63-xfgg","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21517","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35033","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3494","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34982","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34981","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59779","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21517"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115285","reference_id":"2115285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115285"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21517"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5587-7c63-xfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78004?format=json","vulnerability_id":"VCID-5ew9-e39r-n7d7","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22032.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22032.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22032","reference_id":"","reference_type":"","scores":[{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.3164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31619","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31587","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31409","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31284","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31778","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31596","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31607","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3307","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22032"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245014","reference_id":"2245014","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245014"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T20:28:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22032"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ew9-e39r-n7d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78006?format=json","vulnerability_id":"VCID-5f3m-nszz-pub2","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22064.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22064.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22064","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22064"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245016","reference_id":"2245016","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22064"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5f3m-nszz-pub2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78269?format=json","vulnerability_id":"VCID-5g57-6e4s-q3ec","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22033.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22033.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22033","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13528","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13751","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13713","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13663","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13645","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13656","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13851","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22033"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224214","reference_id":"2224214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224214"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22033"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5g57-6e4s-q3ec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79979?format=json","vulnerability_id":"VCID-5hjv-8tfx-ckbx","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35634","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35634"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016121","reference_id":"2016121","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016121"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35634"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjv-8tfx-ckbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80167?format=json","vulnerability_id":"VCID-5hjy-fmy7-cyac","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2427","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2427"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992321","reference_id":"1992321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2427"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjy-fmy7-cyac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80162?format=json","vulnerability_id":"VCID-5msw-bc1r-23e7","summary":"mysql: Server: PS unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2422","reference_id":"","reference_type":"","scores":[{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.40956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41256","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41153","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41253","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.4118","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41236","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41258","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41227","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41213","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2422"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992317","reference_id":"1992317","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2422"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5msw-bc1r-23e7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70365?format=json","vulnerability_id":"VCID-5q9n-91n2-cuha","summary":"mysql: UDF unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30721.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30721","reference_id":"","reference_type":"","scores":[{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4392","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43831","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43834","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43943","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43873","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43925","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43894","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43956","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43947","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43879","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30721"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359894","reference_id":"2359894","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359894"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-17T13:37:47Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30721"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5q9n-91n2-cuha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73660?format=json","vulnerability_id":"VCID-5rqd-z1yh-j7e9","summary":"mysql: PS unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21193.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21193","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33894","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43049","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21193"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318923","reference_id":"2318923","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318923"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21193"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5rqd-z1yh-j7e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56999?format=json","vulnerability_id":"VCID-5sgr-q6mn-u7gq","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14776","reference_id":"","reference_type":"","scores":[{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76541","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76678","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76636","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76666","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890743","reference_id":"1890743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890743"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/","reference_id":"JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/","reference_id":"OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14776"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79790?format=json","vulnerability_id":"VCID-5ufm-419u-2qg3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21351","reference_id":"","reference_type":"","scores":[{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62388","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62493","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.6248","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62487","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62479","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62496","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.6245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62469","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62459","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62436","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21351"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043638","reference_id":"2043638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043638"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21351"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ufm-419u-2qg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57004?format=json","vulnerability_id":"VCID-5ug6-v7ru-j3bv","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14790","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74749","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74785","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74793","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74827","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14790"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890748","reference_id":"1890748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890748"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14790"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ug6-v7ru-j3bv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66834?format=json","vulnerability_id":"VCID-5vcs-6857-6fdf","summary":"mysql: Components Services unspecified vulnerability (CPU Oct 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53069.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53069.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53069","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14342","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53069"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543","reference_id":"1118543","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405541","reference_id":"2405541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405541"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T18:48:36Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23008","reference_id":"RHSA-2025:23008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23109","reference_id":"RHSA-2025:23109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23111","reference_id":"RHSA-2025:23111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23134","reference_id":"RHSA-2025:23134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23137","reference_id":"RHSA-2025:23137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23137"},{"reference_url":"https://usn.ubuntu.com/7873-1/","reference_id":"USN-7873-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7873-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931427?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.44-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.44-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53069"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vcs-6857-6fdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78501?format=json","vulnerability_id":"VCID-5yqx-aj43-7fer","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21977.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21977","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15655","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15653","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15699","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15715","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15711","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15722","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15644","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21977"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188130","reference_id":"2188130","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188130"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21977"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqx-aj43-7fer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73628?format=json","vulnerability_id":"VCID-656v-gkdz-aqbr","summary":"mysql: Optimizer unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21230.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21230","reference_id":"","reference_type":"","scores":[{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47344","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47377","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47328","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47313","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47322","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47325","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.5837","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21230"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318900","reference_id":"2318900","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318900"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21230"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-656v-gkdz-aqbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80140?format=json","vulnerability_id":"VCID-6674-4tmg-1qbg","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2339","reference_id":"","reference_type":"","scores":[{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41408","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41436","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41413","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41442","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.4141","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41439","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41228","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41142","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992280","reference_id":"1992280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2339"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6674-4tmg-1qbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57118?format=json","vulnerability_id":"VCID-66fe-xw3w-xbfh","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2001","reference_id":"","reference_type":"","scores":[{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58168","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58308","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58316","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58318","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.5827","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58249","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2001"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922379","reference_id":"1922379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922379"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2001"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-66fe-xw3w-xbfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79785?format=json","vulnerability_id":"VCID-68eb-ae7g-tbcj","summary":"mysql: Server: Parser unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21304","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51331","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51359","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51366","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51311","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51308","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21304"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043633","reference_id":"2043633","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043633"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"},{"reference_url":"https://usn.ubuntu.com/5270-2/","reference_id":"USN-5270-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21304"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-68eb-ae7g-tbcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78927?format=json","vulnerability_id":"VCID-69yx-qkan-d7d4","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21600","reference_id":"","reference_type":"","scores":[{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79894","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79839","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79842","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79878","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79789","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79775","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79804","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79834","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.7981","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01312","scoring_system":"epss","scoring_elements":"0.79838","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21600"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142864","reference_id":"2142864","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142864"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T15:25:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21600"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-69yx-qkan-d7d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78013?format=json","vulnerability_id":"VCID-6atg-7j6k-dkhp","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22084.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22084","reference_id":"","reference_type":"","scores":[{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.8013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.8015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.80138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.80167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.80174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.80193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.80229","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.80238","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.80178","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.80169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.80198","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01362","scoring_system":"epss","scoring_elements":"0.802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01491","scoring_system":"epss","scoring_elements":"0.81131","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245023","reference_id":"2245023","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0739","reference_id":"RHSA-2025:0739","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0914","reference_id":"RHSA-2025:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0914"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"},{"reference_url":"https://usn.ubuntu.com/6583-1/","reference_id":"USN-6583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6583-1/"},{"reference_url":"https://usn.ubuntu.com/6600-1/","reference_id":"USN-6600-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6600-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22084"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6atg-7j6k-dkhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80412?format=json","vulnerability_id":"VCID-6dtf-9d7c-buep","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2293","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2293"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951778","reference_id":"1951778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951778"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2293"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dtf-9d7c-buep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73627?format=json","vulnerability_id":"VCID-6f2e-dzqk-aqde","summary":"mysql: Components Services unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21232.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21232.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21232","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26377","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26649","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26692","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26478","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26546","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26595","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26555","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26504","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26438","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21232"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318892","reference_id":"2318892","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318892"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21232"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6f2e-dzqk-aqde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57001?format=json","vulnerability_id":"VCID-6grs-76qf-jqhf","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14785","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14785"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890745","reference_id":"1890745","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890745"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14785"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6grs-76qf-jqhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74826?format=json","vulnerability_id":"VCID-6h2m-q2sr-fygj","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21162.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21162.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21162","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44109","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44212","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44236","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44225","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44187","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21162"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298340","reference_id":"2298340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298340"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:33:52Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21162"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6h2m-q2sr-fygj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/253338?format=json","vulnerability_id":"VCID-6kqv-c42t-jqbj","summary":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35594","reference_id":"","reference_type":"","scores":[{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97308","published_at":"2026-04-29T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97292","published_at":"2026-04-13T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97269","published_at":"2026-04-01T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97279","published_at":"2026-04-04T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.9728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97287","published_at":"2026-04-08T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97288","published_at":"2026-04-09T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97291","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35594"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1227/","reference_id":"ZDI-21-1227","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:51Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1227/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35594"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6kqv-c42t-jqbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71974?format=json","vulnerability_id":"VCID-6q82-uqt4-tua4","summary":"mysql: MySQL Server Options Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21520.json","reference_id":"","reference_type":"","scores":[{"value":"1.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21520","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06785","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06805","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06648","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06678","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06712","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0671","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06704","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06629","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06777","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21520"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339220","reference_id":"2339220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339220"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"1.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:35:04Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21520"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6q82-uqt4-tua4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70384?format=json","vulnerability_id":"VCID-6rq1-1zdv-wuh9","summary":"mysql: Optimizer unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21585.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21585","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21585"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359903","reference_id":"2359903","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359903"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T19:47:49Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21585"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6rq1-1zdv-wuh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80150?format=json","vulnerability_id":"VCID-6u9x-qcnt-cqc8","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2383","reference_id":"","reference_type":"","scores":[{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54889","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54938","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54914","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5493","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2383"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992305","reference_id":"1992305","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992305"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2383"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6u9x-qcnt-cqc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78929?format=json","vulnerability_id":"VCID-6ufw-3gfn-5ygm","summary":"mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21605","reference_id":"","reference_type":"","scores":[{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66899","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66901","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66902","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21605"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142866","reference_id":"2142866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142866"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21605"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ufw-3gfn-5ygm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57011?format=json","vulnerability_id":"VCID-6w26-6psj-zubm","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14809","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14809"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890755","reference_id":"1890755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890755"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:05Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14809"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6w26-6psj-zubm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57018?format=json","vulnerability_id":"VCID-6z2t-rt9t-wydy","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14828","reference_id":"","reference_type":"","scores":[{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76279","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7632","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76325","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76266","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7628","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76284","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14828"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890760","reference_id":"1890760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890760"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:02Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14828"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6z2t-rt9t-wydy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57032?format=json","vulnerability_id":"VCID-71bd-rm5x-cud8","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14848","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14848"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890770","reference_id":"1890770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890770"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:27Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14848"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71bd-rm5x-cud8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77838?format=json","vulnerability_id":"VCID-75us-ex8b-9bea","summary":"mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20984","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48467","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48526","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4852","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48538","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48523","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48573","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48569","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20984"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258793","reference_id":"2258793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20984"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75us-ex8b-9bea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70376?format=json","vulnerability_id":"VCID-76sm-3tw7-qqbu","summary":"mysql: Optimizer unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30688.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30688.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30688","reference_id":"","reference_type":"","scores":[{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50242","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50303","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50324","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50287","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50333","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50307","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30688"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359888","reference_id":"2359888","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359888"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:19Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30688"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76sm-3tw7-qqbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80386?format=json","vulnerability_id":"VCID-77bs-kuvf-eua3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2170","reference_id":"","reference_type":"","scores":[{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79165","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2170"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951757","reference_id":"1951757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951757"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2170"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-77bs-kuvf-eua3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78500?format=json","vulnerability_id":"VCID-78yc-ncfs-jyd8","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21976.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21976","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14879","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14841","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14896","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14934","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14936","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14999","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14835","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21976"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188129","reference_id":"2188129","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188129"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21976"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-78yc-ncfs-jyd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78487?format=json","vulnerability_id":"VCID-7ft5-5uaa-mqea","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21929.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21929","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33873","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3329","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3376","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33803","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3379","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33758","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33373","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33905","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188116","reference_id":"2188116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188116"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21929"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ft5-5uaa-mqea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78739?format=json","vulnerability_id":"VCID-7g35-wex8-dygz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21866","reference_id":"","reference_type":"","scores":[{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65134","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65112","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65105","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21866"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162273","reference_id":"2162273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21866"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7g35-wex8-dygz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57024?format=json","vulnerability_id":"VCID-7jj8-tenv-zub1","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14837","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14837"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890764","reference_id":"1890764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890764"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:39Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14837"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7jj8-tenv-zub1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78488?format=json","vulnerability_id":"VCID-7jwt-xtch-y3g7","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21933.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21933","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21933"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188117","reference_id":"2188117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188117"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21933"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7jwt-xtch-y3g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78486?format=json","vulnerability_id":"VCID-7nff-sauv-ekfw","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21920.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21920.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21920","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21920"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188115","reference_id":"2188115","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188115"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21920"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7nff-sauv-ekfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76856?format=json","vulnerability_id":"VCID-7r4v-t4uj-a7az","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21050.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21050.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21050","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24959","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25075","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25015","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25003","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32856","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275438","reference_id":"2275438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275438"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:59:29Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0012/","reference_id":"ntap-20240426-0012","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:59:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21050"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7r4v-t4uj-a7az"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79495?format=json","vulnerability_id":"VCID-7r77-wwtj-bbgs","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21417","reference_id":"","reference_type":"","scores":[{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59343","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59374","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59339","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59293","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59376","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59359","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59341","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082640","reference_id":"2082640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082640"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21417"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7r77-wwtj-bbgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80407?format=json","vulnerability_id":"VCID-7shp-crcm-vqfe","summary":"mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2226","reference_id":"","reference_type":"","scores":[{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82386","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82499","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82522","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82532","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82449","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82494","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2226"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951774","reference_id":"1951774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951774"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2226"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7shp-crcm-vqfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79218?format=json","vulnerability_id":"VCID-7wzz-nva6-yqaz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21528","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21528"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115290","reference_id":"2115290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115290"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21528"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7wzz-nva6-yqaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78942?format=json","vulnerability_id":"VCID-81qz-dkfs-wkan","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39400.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39400.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39400","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39400"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142879","reference_id":"2142879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142879"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-39400"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-81qz-dkfs-wkan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80158?format=json","vulnerability_id":"VCID-82ep-d3fc-dbc2","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2410","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2410"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992313","reference_id":"1992313","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992313"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2410"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-82ep-d3fc-dbc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70377?format=json","vulnerability_id":"VCID-84d5-fy7j-nqf2","summary":"mysql: Optimizer unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30687.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30687.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30687","reference_id":"","reference_type":"","scores":[{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50242","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50303","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50324","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50287","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50333","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50307","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30687"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359924","reference_id":"2359924","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359924"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:16:16Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30687"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-84d5-fy7j-nqf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78748?format=json","vulnerability_id":"VCID-859e-runv-4qah","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21875.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21875.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21875","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38553","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38837","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38802","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38718","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21875"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162282","reference_id":"2162282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21875"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-859e-runv-4qah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79509?format=json","vulnerability_id":"VCID-8fkf-84dd-7ya2","summary":"mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21457","reference_id":"","reference_type":"","scores":[{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.82994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.8312","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.8308","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83083","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83106","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83007","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83004","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83029","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83052","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83046","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83041","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21457"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082654","reference_id":"2082654","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082654"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21457"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkf-84dd-7ya2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57132?format=json","vulnerability_id":"VCID-8h4m-83xa-m7df","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2021","reference_id":"","reference_type":"","scores":[{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97882","published_at":"2026-04-01T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97887","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97902","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97903","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.9791","published_at":"2026-04-26T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97909","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2021"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922388","reference_id":"1922388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922388"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2021"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4m-83xa-m7df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76850?format=json","vulnerability_id":"VCID-8hkp-b8e4-2yfm","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21008.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21008","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24672","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24788","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24717","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32449","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32525","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32529","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32491","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32465","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.325","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32478","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21008"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275432","reference_id":"2275432","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275432"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:03:21Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T17:03:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21008"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8hkp-b8e4-2yfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79975?format=json","vulnerability_id":"VCID-8m18-147e-4ka4","summary":"mysql: Server: Options unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35630","reference_id":"","reference_type":"","scores":[{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.6157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61644","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61746","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61729","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61723","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61739","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61731","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61719","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.6174","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35630"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016117","reference_id":"2016117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016117"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35630"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8m18-147e-4ka4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79783?format=json","vulnerability_id":"VCID-8mnm-4cgf-2bbt","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21302","reference_id":"","reference_type":"","scores":[{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63449","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63534","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63513","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.6352","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63506","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63539","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63441","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.6351","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21302"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043631","reference_id":"2043631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043631"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21302"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8mnm-4cgf-2bbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70383?format=json","vulnerability_id":"VCID-8nfw-mqrw-jbc9","summary":"mysql: Replication unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30681.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30681.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30681","reference_id":"","reference_type":"","scores":[{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.53995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54036","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54053","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.53998","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5405","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54096","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5406","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.541","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54104","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54086","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30681"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359918","reference_id":"2359918","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359918"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:50:39Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30681"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8nfw-mqrw-jbc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79501?format=json","vulnerability_id":"VCID-8t59-zf4q-afgb","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21436","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57529","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21436"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082646","reference_id":"2082646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082646"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21436"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8t59-zf4q-afgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79221?format=json","vulnerability_id":"VCID-8tpm-5kqs-efhd","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21531","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21531"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115293","reference_id":"2115293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115293"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21531"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8tpm-5kqs-efhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77828?format=json","vulnerability_id":"VCID-8wy6-axhs-a7b9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20972","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44238","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44325","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20972"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258783","reference_id":"2258783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20972"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8wy6-axhs-a7b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78746?format=json","vulnerability_id":"VCID-8x1f-u547-tqb3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21873.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21873.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21873","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21873"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162280","reference_id":"2162280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21873"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8x1f-u547-tqb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80404?format=json","vulnerability_id":"VCID-8xpx-1fpf-m3fa","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2215","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2215"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951772","reference_id":"1951772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951772"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2215"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8xpx-1fpf-m3fa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78016?format=json","vulnerability_id":"VCID-9573-txzw-6yhb","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22097.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22097.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22097","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22097"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245026","reference_id":"2245026","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22097"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9573-txzw-6yhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78012?format=json","vulnerability_id":"VCID-968h-b244-cqeu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22079.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22079","reference_id":"","reference_type":"","scores":[{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33365","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33444","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33405","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33383","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33419","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33394","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33206","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33189","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33109","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22079"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245022","reference_id":"2245022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22079"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-968h-b244-cqeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71984?format=json","vulnerability_id":"VCID-971x-csw5-tqbb","summary":"mysql: MySQL Server (InnoDB): Denial of Service and Data Modification via network access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21497.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21497.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21497","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2534","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25389","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25382","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25668","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25551","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2552","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25467","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25425","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21497"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339218","reference_id":"2339218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339218"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:42:53Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21497"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-971x-csw5-tqbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79500?format=json","vulnerability_id":"VCID-9851-8zjc-zfgf","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21435","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45358","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21435"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082645","reference_id":"2082645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082645"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21435"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9851-8zjc-zfgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70374?format=json","vulnerability_id":"VCID-9c35-pmbb-efe9","summary":"mysql: mariadb: InnoDB unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30693.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30693","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51469","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51467","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58605","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58586","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58622","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00366","scoring_system":"epss","scoring_elements":"0.58627","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976","reference_id":"1105976","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359963","reference_id":"2359963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359963"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:23:08Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19572","reference_id":"RHSA-2025:19572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19584","reference_id":"RHSA-2025:19584","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19584"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0136","reference_id":"RHSA-2026:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0247","reference_id":"RHSA-2026:0247","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0334","reference_id":"RHSA-2026:0334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0335","reference_id":"RHSA-2026:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0376","reference_id":"RHSA-2026:0376","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6435","reference_id":"RHSA-2026:6435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6435"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"},{"reference_url":"https://usn.ubuntu.com/7519-1/","reference_id":"USN-7519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7519-1/"},{"reference_url":"https://usn.ubuntu.com/7548-1/","reference_id":"USN-7548-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7548-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30693"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9c35-pmbb-efe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80394?format=json","vulnerability_id":"VCID-9dt5-yek1-wfg9","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2194","reference_id":"","reference_type":"","scores":[{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78612","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78739","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.7869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78715","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78722","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.7863","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951764","reference_id":"1951764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951764"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2194"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dt5-yek1-wfg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79493?format=json","vulnerability_id":"VCID-9fvk-eqmz-zfcz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21414","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57529","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21414"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082638","reference_id":"2082638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082638"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21414"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9fvk-eqmz-zfcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78273?format=json","vulnerability_id":"VCID-9gmt-rub8-mfgn","summary":"mysql: Client programs unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22053.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22053","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21568","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21788","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21856","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21817","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21758","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21759","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21765","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21731","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21583","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21945","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21711","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22053"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224218","reference_id":"2224218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224218"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"},{"reference_url":"https://usn.ubuntu.com/6288-2/","reference_id":"USN-6288-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22053"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9gmt-rub8-mfgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77821?format=json","vulnerability_id":"VCID-9mcw-ujzr-g7a4","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20965","reference_id":"","reference_type":"","scores":[{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66699","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66593","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66619","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66639","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66671","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66659","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20965"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258776","reference_id":"2258776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258776"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0006/","reference_id":"ntap-20240201-0006","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20965"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9mcw-ujzr-g7a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57045?format=json","vulnerability_id":"VCID-9nry-61xw-cug4","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14869","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14869"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890777","reference_id":"1890777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890777"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:09Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14869"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9nry-61xw-cug4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78010?format=json","vulnerability_id":"VCID-9nv5-fnr2-aqch","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22070.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22070.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22070","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22070"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245020","reference_id":"2245020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22070"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9nv5-fnr2-aqch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79779?format=json","vulnerability_id":"VCID-9su2-mawm-8ued","summary":"mysql: Server: Federated unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21270","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51331","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51359","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51366","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51311","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51308","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21270"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043627","reference_id":"2043627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043627"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"},{"reference_url":"https://usn.ubuntu.com/5270-2/","reference_id":"USN-5270-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21270"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9su2-mawm-8ued"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73639?format=json","vulnerability_id":"VCID-9thc-he15-puav","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21213.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21213","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1235","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12396","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12197","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12327","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12148","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1215","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1226","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21213"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318905","reference_id":"2318905","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318905"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21213"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9thc-he15-puav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78751?format=json","vulnerability_id":"VCID-9x3z-66pg-13c9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21878.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21878.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21878","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3189","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32095","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32351","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32352","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32314","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32286","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3227","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21878"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162285","reference_id":"2162285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21878"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9x3z-66pg-13c9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57027?format=json","vulnerability_id":"VCID-9ycb-mjma-7qfv","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14839","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14839"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890766","reference_id":"1890766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890766"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:37Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14839"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ycb-mjma-7qfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68642?format=json","vulnerability_id":"VCID-a1vk-zbpw-wyh7","summary":"mysql: DDL unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50094.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50094.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50094","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27639","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27531","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27849","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27756","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27691","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50094"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380326","reference_id":"2380326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380326"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T13:45:35Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50094"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a1vk-zbpw-wyh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74821?format=json","vulnerability_id":"VCID-a3fa-dj6h-3bdg","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21137.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21137.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21137","reference_id":"","reference_type":"","scores":[{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33899","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34003","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33984","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34383","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34418","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34394","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34429","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34374","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21137"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298321","reference_id":"2298321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298321"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:29:30Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21137"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a3fa-dj6h-3bdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70364?format=json","vulnerability_id":"VCID-a732-u6ue-57h5","summary":"mysql: mariadb: mysqldump unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30722","reference_id":"","reference_type":"","scores":[{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56587","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56604","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56693","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57134","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57136","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976","reference_id":"1105976","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105976"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359885","reference_id":"2359885","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359885"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-17T13:37:19Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19572","reference_id":"RHSA-2025:19572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19584","reference_id":"RHSA-2025:19584","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19584"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0136","reference_id":"RHSA-2026:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0247","reference_id":"RHSA-2026:0247","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0334","reference_id":"RHSA-2026:0334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0335","reference_id":"RHSA-2026:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0376","reference_id":"RHSA-2026:0376","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6435","reference_id":"RHSA-2026:6435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6435"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"},{"reference_url":"https://usn.ubuntu.com/7519-1/","reference_id":"USN-7519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7519-1/"},{"reference_url":"https://usn.ubuntu.com/7548-1/","reference_id":"USN-7548-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7548-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30722"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a732-u6ue-57h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78926?format=json","vulnerability_id":"VCID-a91v-ghah-17cp","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21599.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21599","reference_id":"","reference_type":"","scores":[{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20197","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21559","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2182","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2183","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21599"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142863","reference_id":"2142863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142863"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21599"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a91v-ghah-17cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57000?format=json","vulnerability_id":"VCID-aaq9-6yhn-afbx","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14777","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14777"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890744","reference_id":"1890744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890744"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14777"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aaq9-6yhn-afbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77827?format=json","vulnerability_id":"VCID-ab1w-d1qc-3yaa","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20971","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36902","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37296","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37243","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37317","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37329","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37267","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37314","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20971"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258782","reference_id":"2258782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258782"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:46:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20971"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ab1w-d1qc-3yaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70375?format=json","vulnerability_id":"VCID-ab6q-n2ct-wuf9","summary":"mysql: Optimizer unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30689.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30689.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30689","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30689"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359945","reference_id":"2359945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359945"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:31:02Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30689"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ab6q-n2ct-wuf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79965?format=json","vulnerability_id":"VCID-ac7j-w1pc-z3h2","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35610","reference_id":"","reference_type":"","scores":[{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73167","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73177","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73222","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73247","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73221","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73264","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73273","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73197","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73172","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35610"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016106","reference_id":"2016106","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016106"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35610"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ac7j-w1pc-z3h2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57020?format=json","vulnerability_id":"VCID-aczd-32sa-fffg","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14829","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14829"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890761","reference_id":"1890761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890761"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:49Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14829"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aczd-32sa-fffg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79214?format=json","vulnerability_id":"VCID-ae8p-nu59-mfb2","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21522","reference_id":"","reference_type":"","scores":[{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47941","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47961","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47938","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47948","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.48002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47997","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70962","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21522"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115286","reference_id":"2115286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115286"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21522"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae8p-nu59-mfb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76849?format=json","vulnerability_id":"VCID-aese-hdx6-83dj","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21000.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21000","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37865","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38152","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37961","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38174","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38224","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38252","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38192","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38239","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21000"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275431","reference_id":"2275431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275431"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:32:25Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-03T19:32:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21000"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aese-hdx6-83dj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79988?format=json","vulnerability_id":"VCID-afgm-qfjk-77h2","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35643","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54844","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54863","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54822","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35643"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016132","reference_id":"2016132","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016132"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35643"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-afgm-qfjk-77h2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78932?format=json","vulnerability_id":"VCID-aq75-zern-cfc1","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21611.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21611","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06999","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0701","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06993","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07034","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07038","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06935","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07006","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21611"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142869","reference_id":"2142869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142869"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21611"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aq75-zern-cfc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78749?format=json","vulnerability_id":"VCID-athx-ebka-d3h9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21876.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21876","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32738","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33171","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33039","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32998","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21876"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162283","reference_id":"2162283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21876"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-athx-ebka-d3h9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78931?format=json","vulnerability_id":"VCID-b243-p5y2-f3gp","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21608.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21608","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25724","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25918","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21608"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142868","reference_id":"2142868","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142868"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"},{"reference_url":"https://usn.ubuntu.com/5696-2/","reference_id":"USN-5696-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21608"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b243-p5y2-f3gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80151?format=json","vulnerability_id":"VCID-b4wd-75p9-bqgh","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2384","reference_id":"","reference_type":"","scores":[{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63197","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2384"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992306","reference_id":"1992306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992306"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2384"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4wd-75p9-bqgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78736?format=json","vulnerability_id":"VCID-b72z-7wpc-7uhk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21863.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21863","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21863"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162270","reference_id":"2162270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162270"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21863"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b72z-7wpc-7uhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68635?format=json","vulnerability_id":"VCID-b7w5-jvau-5yez","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50099.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50099.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50099","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50099"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380291","reference_id":"2380291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380291"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:04:20Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50099"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b7w5-jvau-5yez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79982?format=json","vulnerability_id":"VCID-bbzn-prse-7fhm","summary":"mysql: Server: PS unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35637","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44222","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44038","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44268","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44118","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44122","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44234","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44218","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44219","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44278","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016126","reference_id":"2016126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016126"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35637"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bbzn-prse-7fhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79987?format=json","vulnerability_id":"VCID-bcv2-xfb3-4ker","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35642","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54844","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54863","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54822","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35642"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016131","reference_id":"2016131","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016131"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35642"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bcv2-xfb3-4ker"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78275?format=json","vulnerability_id":"VCID-bdsp-jhdj-5qdd","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22056.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22056.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22056","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35272","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35668","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35691","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35656","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35673","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35374","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35622","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22056"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224220","reference_id":"2224220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224220"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22056"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdsp-jhdj-5qdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68640?format=json","vulnerability_id":"VCID-be9u-p3ue-wqd6","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50092.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50092.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50092","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50092"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380264","reference_id":"2380264","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380264"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T13:48:03Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50092"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-be9u-p3ue-wqd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71975?format=json","vulnerability_id":"VCID-bexa-vrnu-6qfd","summary":"mysql: MySQL Server: Denial of service in Thread Pooling component","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21521.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21521.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21521","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36861","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36948","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37281","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37292","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37258","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.3723","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37276","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37205","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21521"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339270","reference_id":"2339270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339270"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:34:04Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1755","reference_id":"RHSA-2025:1755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1757","reference_id":"RHSA-2025:1757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1766","reference_id":"RHSA-2025:1766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1767","reference_id":"RHSA-2025:1767","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2882","reference_id":"RHSA-2025:2882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2883","reference_id":"RHSA-2025:2883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2883"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21521"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bexa-vrnu-6qfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79798?format=json","vulnerability_id":"VCID-bf13-qnc8-gkeh","summary":"mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21374","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48243","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21374"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043646","reference_id":"2043646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043646"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21374"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bf13-qnc8-gkeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80170?format=json","vulnerability_id":"VCID-bg43-1ngx-17cb","summary":"mysql: Server: DML unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2440","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34671","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34887","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3444","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34784","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34547","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34914","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34835","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34845","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2440"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992324","reference_id":"1992324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2440"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bg43-1ngx-17cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78489?format=json","vulnerability_id":"VCID-bg4z-h1ya-bkg9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21935.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21935.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21935","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21935"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188118","reference_id":"2188118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188118"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21935"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bg4z-h1ya-bkg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79223?format=json","vulnerability_id":"VCID-bk52-etdq-8bgt","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21537","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21537"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115295","reference_id":"2115295","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115295"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21537"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bk52-etdq-8bgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74827?format=json","vulnerability_id":"VCID-bm1r-epa6-tfe3","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21163.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21163.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21163","reference_id":"","reference_type":"","scores":[{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37706","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3761","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37725","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37692","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39539","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21163"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298341","reference_id":"2298341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298341"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T19:03:51Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21163"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bm1r-epa6-tfe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78944?format=json","vulnerability_id":"VCID-brdf-qg3q-7yc2","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39410.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39410.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39410","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37412","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37385","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37357","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37138","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37434","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39410"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142881","reference_id":"2142881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142881"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-39410"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-brdf-qg3q-7yc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78019?format=json","vulnerability_id":"VCID-btvr-seff-xqdj","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22110.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22110.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22110","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22110"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245029","reference_id":"2245029","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22110"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-btvr-seff-xqdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/253336?format=json","vulnerability_id":"VCID-bu6s-4qt6-nkfz","summary":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35593","reference_id":"","reference_type":"","scores":[{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97308","published_at":"2026-04-29T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97292","published_at":"2026-04-13T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97269","published_at":"2026-04-01T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97279","published_at":"2026-04-04T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.9728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97287","published_at":"2026-04-08T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97288","published_at":"2026-04-09T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97291","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35593"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1229/","reference_id":"ZDI-21-1229","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:53Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1229/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35593"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bu6s-4qt6-nkfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76866?format=json","vulnerability_id":"VCID-bv6s-qfef-b7ah","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21062.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21062","reference_id":"","reference_type":"","scores":[{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33675","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33785","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33762","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43691","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43716","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43651","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43724","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43727","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21062"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275449","reference_id":"2275449","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275449"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T15:37:53Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-30T15:37:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21062"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bv6s-qfef-b7ah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71962?format=json","vulnerability_id":"VCID-bvks-r4se-afft","summary":"mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21559.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21559.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21559","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33479","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3356","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34101","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34001","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33988","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33955","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21559"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339295","reference_id":"2339295","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339295"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-22T16:11:04Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21559"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bvks-r4se-afft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80171?format=json","vulnerability_id":"VCID-byam-rx6m-3yab","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2441","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2441"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992325","reference_id":"1992325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2441"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byam-rx6m-3yab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79958?format=json","vulnerability_id":"VCID-byru-kqru-gfe6","summary":"mysql: Server: DML unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35591","reference_id":"","reference_type":"","scores":[{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59899","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59977","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60023","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60057","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60042","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60064","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60056","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60027","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60044","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59973","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35591"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016097","reference_id":"2016097","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016097"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35591"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byru-kqru-gfe6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70379?format=json","vulnerability_id":"VCID-bz3s-3fbf-j3f1","summary":"mysql: Optimizer unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30682.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30682.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30682","reference_id":"","reference_type":"","scores":[{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50242","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50303","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50304","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50324","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50287","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50333","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00268","scoring_system":"epss","scoring_elements":"0.50307","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30682"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359895","reference_id":"2359895","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359895"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T19:16:35Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30682"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bz3s-3fbf-j3f1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57126?format=json","vulnerability_id":"VCID-c1gb-f47t-2fha","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2012.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2012","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2012"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922422","reference_id":"1922422","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922422"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931410?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.21-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.21-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2012"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c1gb-f47t-2fha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68637?format=json","vulnerability_id":"VCID-c472-64vq-5kca","summary":"mysql: Optimizer  unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50098.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50098.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50098","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25573","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25498","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27361","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27437","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27742","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27699","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27625","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27587","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50098"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380327","reference_id":"2380327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380327"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:04:24Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50098"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c472-64vq-5kca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80168?format=json","vulnerability_id":"VCID-c5u7-hdrq-2qcm","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2429","reference_id":"","reference_type":"","scores":[{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.9008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90147","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.9012","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90137","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90134","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90092","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90118","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2429"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992322","reference_id":"1992322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-889/","reference_id":"ZDI-21-889","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:35Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-889/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2429"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c5u7-hdrq-2qcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57137?format=json","vulnerability_id":"VCID-c6rw-mujf-qqbj","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2030","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2030"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922392","reference_id":"1922392","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922392"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2030"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6rw-mujf-qqbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/253334?format=json","vulnerability_id":"VCID-c95m-82hu-1qbg","summary":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35592","reference_id":"","reference_type":"","scores":[{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96552","published_at":"2026-04-29T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96549","published_at":"2026-04-18T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96529","published_at":"2026-04-08T12:55:00Z"},{"value":"0.28625","scoring_system":"epss","scoring_elements":"0.96531","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35592"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1228/","reference_id":"ZDI-21-1228","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:54Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1228/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35592"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c95m-82hu-1qbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78742?format=json","vulnerability_id":"VCID-cba4-wgmt-67h8","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21869.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21869","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26749","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26823","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26815","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26872","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21869"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162276","reference_id":"2162276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21869"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cba4-wgmt-67h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77839?format=json","vulnerability_id":"VCID-cbw5-wtpg-4qh4","summary":"mysql: Server: UDF unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20985","reference_id":"","reference_type":"","scores":[{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70534","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70432","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.7045","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70488","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70497","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70483","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70526","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20985"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258794","reference_id":"2258794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258794"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T21:46:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20985"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbw5-wtpg-4qh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76851?format=json","vulnerability_id":"VCID-cd8b-jfc5-d7hc","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21009.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21009.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21009","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35383","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35734","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35469","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36648","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36485","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36537","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36548","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3653","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21009"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275433","reference_id":"2275433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275433"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:44:02Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:44:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21009"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cd8b-jfc5-d7hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79217?format=json","vulnerability_id":"VCID-cehv-gwcs-eudz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21527","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21527"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115289","reference_id":"2115289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21527"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cehv-gwcs-eudz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79507?format=json","vulnerability_id":"VCID-cesc-kr1b-cugn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21452","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57529","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21452"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082652","reference_id":"2082652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082652"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21452"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cesc-kr1b-cugn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57153?format=json","vulnerability_id":"VCID-ch22-5f87-tfhw","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2061","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2061"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922403","reference_id":"1922403","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922403"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2061"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ch22-5f87-tfhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78740?format=json","vulnerability_id":"VCID-chj1-f5ha-4bfu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21867.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21867","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26578","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21867"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162274","reference_id":"2162274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162274"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21867"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-chj1-f5ha-4bfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80153?format=json","vulnerability_id":"VCID-ckdu-28ct-2kb7","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2387","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2387"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992308","reference_id":"1992308","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2387"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ckdu-28ct-2kb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57043?format=json","vulnerability_id":"VCID-cr9r-v269-7qan","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14867","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14867"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890775","reference_id":"1890775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890775"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:11Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14867"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cr9r-v269-7qan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74830?format=json","vulnerability_id":"VCID-cs7k-cvjg-ykdy","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21171.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21171.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21171","reference_id":"","reference_type":"","scores":[{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51154","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51193","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51197","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51155","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5121","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51206","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5125","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51229","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51215","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51253","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5126","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51238","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21171"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298349","reference_id":"2298349","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298349"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:09:04Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21171"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cs7k-cvjg-ykdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79227?format=json","vulnerability_id":"VCID-ctj6-46ju-ybaa","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21553","reference_id":"","reference_type":"","scores":[{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55791","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58885","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58908","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58909","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21553"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115299","reference_id":"2115299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21553"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctj6-46ju-ybaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70380?format=json","vulnerability_id":"VCID-cuvf-4ng7-1yfk","summary":"mysql: Replication unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30683.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30683.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30683","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30683"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359899","reference_id":"2359899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359899"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T19:03:39Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30683"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cuvf-4ng7-1yfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78007?format=json","vulnerability_id":"VCID-cv2y-w2zv-9qbx","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22065.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22065.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22065","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22065"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245017","reference_id":"2245017","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245017"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-23T19:43:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22065"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cv2y-w2zv-9qbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71968?format=json","vulnerability_id":"VCID-cvuu-3h7s-u3b4","summary":"mysql: MySQL Server: Denial of Service vulnerability via network access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21534.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21534","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24425","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21534"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339275","reference_id":"2339275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339275"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:27:42Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21534"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cvuu-3h7s-u3b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79797?format=json","vulnerability_id":"VCID-d3c8-yxse-gqa1","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21372","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32203","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32175","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32013","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31885","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3226","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32225","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043645","reference_id":"2043645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043645"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21372"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d3c8-yxse-gqa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70389?format=json","vulnerability_id":"VCID-d54y-dxm7-9fds","summary":"mysql: Optimizer unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21581.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21581.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21581","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21581"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359944","reference_id":"2359944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359944"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T20:17:33Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21581"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d54y-dxm7-9fds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56987?format=json","vulnerability_id":"VCID-d5hc-4qz5-3uag","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14672","reference_id":"","reference_type":"","scores":[{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77954","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78091","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.7799","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78002","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78029","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78011","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78038","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78071","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78078","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14672"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890737","reference_id":"1890737","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890737"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14672"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5hc-4qz5-3uag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57162?format=json","vulnerability_id":"VCID-d5js-9kvw-dyf9","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2122","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2122"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922411","reference_id":"1922411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922411"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2122"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5js-9kvw-dyf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68649?format=json","vulnerability_id":"VCID-d8q7-3c2j-73dc","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50082.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50082","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29295","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31028","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31244","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31215","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31188","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50082"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380306","reference_id":"2380306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380306"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T15:50:54Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50082"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d8q7-3c2j-73dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78484?format=json","vulnerability_id":"VCID-d9d6-kt1p-17ej","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21917.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21917.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21917","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36352","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36263","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.3598","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36385","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36219","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36269","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36291","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.3626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36235","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36279","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21917"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188112","reference_id":"2188112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188112"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21917"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d9d6-kt1p-17ej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57028?format=json","vulnerability_id":"VCID-da5g-ea4u-qfeh","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14844","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14844"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890767","reference_id":"1890767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890767"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:32Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14844"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-da5g-ea4u-qfeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79498?format=json","vulnerability_id":"VCID-dbat-jj2y-sqbw","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21425","reference_id":"","reference_type":"","scores":[{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59851","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59795","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5988","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59864","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21425"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082643","reference_id":"2082643","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082643"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21425"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dbat-jj2y-sqbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57005?format=json","vulnerability_id":"VCID-dcyd-xspe-q7eh","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14791","reference_id":"","reference_type":"","scores":[{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62177","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62095","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62183","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14791"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890749","reference_id":"1890749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890749"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14791"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyd-xspe-q7eh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78024?format=json","vulnerability_id":"VCID-dguz-9k3b-gkbz","summary":"mysql: Server: DML unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22115.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22115.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22115","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22115"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245034","reference_id":"2245034","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22115"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dguz-9k3b-gkbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78737?format=json","vulnerability_id":"VCID-dkss-szpz-cfdh","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21864.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21864","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162271","reference_id":"2162271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21864"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dkss-szpz-cfdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71989?format=json","vulnerability_id":"VCID-dmsh-sn3k-tuct","summary":"mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21491.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21491","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21696","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21712","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21704","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22078","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21974","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2189","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21891","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21859","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21491"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339252","reference_id":"2339252","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339252"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T19:17:37Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21491"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dmsh-sn3k-tuct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71979?format=json","vulnerability_id":"VCID-dmz5-czt2-hkdz","summary":"mysql: Components Services unspecified vulnerability (CPU Jan 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21505.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21505","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24425","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21505"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339305","reference_id":"2339305","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339305"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:42:02Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21505"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dmz5-czt2-hkdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78498?format=json","vulnerability_id":"VCID-dp3v-716h-cbep","summary":"mysql: Server: JSON unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21966.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21966","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12581","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12601","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12611","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12724","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12734","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1276","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12744","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12697","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21966"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188127","reference_id":"2188127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188127"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21966"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dp3v-716h-cbep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78503?format=json","vulnerability_id":"VCID-ds2a-wbbd-7fev","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21982.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21982","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12985","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12987","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12883","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21982"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188132","reference_id":"2188132","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188132"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21982"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2a-wbbd-7fev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57141?format=json","vulnerability_id":"VCID-dsp1-f2v8-z7fb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2038","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2038"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922396","reference_id":"1922396","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922396"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2038"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dsp1-f2v8-z7fb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78744?format=json","vulnerability_id":"VCID-dudq-65hd-kfek","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21871.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21871","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21871"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162278","reference_id":"2162278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21871"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dudq-65hd-kfek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80410?format=json","vulnerability_id":"VCID-dv9f-cgsn-skgf","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2278","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2278"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951777","reference_id":"1951777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951777"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2278"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dv9f-cgsn-skgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68645?format=json","vulnerability_id":"VCID-dvgw-62mg-z7dp","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50087.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50087.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50087","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25378","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25306","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25191","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25466","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25616","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25617","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25601","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25573","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50087"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380310","reference_id":"2380310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380310"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:04:29Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50087"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvgw-62mg-z7dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80169?format=json","vulnerability_id":"VCID-dwdy-u6t6-d7d3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2437","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2437"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992323","reference_id":"1992323","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2437"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dwdy-u6t6-d7d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76869?format=json","vulnerability_id":"VCID-dxbv-e8pq-p7ew","summary":"mysql: Client: mysqldump unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21096.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21096","reference_id":"","reference_type":"","scores":[{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31301","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.3121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31123","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31104","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31245","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31325","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31452","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21096"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275452","reference_id":"2275452","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275452"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/","reference_id":"CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKWVBZ6DBRFMLDXTHJUZ6LU7MJ5RTNA7/"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/","reference_id":"KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFYBDWDBE4YICSV34LJZGYRVSG6QIRKE/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:34:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0737","reference_id":"RHSA-2025:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0739","reference_id":"RHSA-2025:0739","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0912","reference_id":"RHSA-2025:0912","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0912"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0914","reference_id":"RHSA-2025:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0335","reference_id":"RHSA-2026:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0335"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"},{"reference_url":"https://usn.ubuntu.com/6839-1/","reference_id":"USN-6839-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6839-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21096"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dxbv-e8pq-p7ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73649?format=json","vulnerability_id":"VCID-dycb-nkab-6fcv","summary":"mysql: PS unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21204.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21204","reference_id":"","reference_type":"","scores":[{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.3978","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39876","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39861","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.4014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40153","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40127","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40048","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21204"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318903","reference_id":"2318903","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318903"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21204"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dycb-nkab-6fcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57128?format=json","vulnerability_id":"VCID-e1p7-4g2g-wuac","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2016.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2016.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2016","reference_id":"","reference_type":"","scores":[{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.5765","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57735","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.5772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57787","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57803","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57781","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.5776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57763","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57722","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57741","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00354","scoring_system":"epss","scoring_elements":"0.57756","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922420","reference_id":"1922420","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922420"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2016"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1p7-4g2g-wuac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79503?format=json","vulnerability_id":"VCID-e33p-spt4-33bn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21438","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57529","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21438"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082648","reference_id":"2082648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082648"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21438"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e33p-spt4-33bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68648?format=json","vulnerability_id":"VCID-e61b-ktgf-23bf","summary":"mysql: Components Services unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50086.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50086.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50086","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29724","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29771","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3005","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30029","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29984","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50086"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380298","reference_id":"2380298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380298"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T19:25:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50086"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e61b-ktgf-23bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80400?format=json","vulnerability_id":"VCID-e7y6-8acx-tuh8","summary":"mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2208","reference_id":"","reference_type":"","scores":[{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.8019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80327","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80309","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80248","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80242","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80272","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2208"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951769","reference_id":"1951769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951769"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2208"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e7y6-8acx-tuh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79781?format=json","vulnerability_id":"VCID-e8ge-ejs7-7ben","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21297","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39325","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39716","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21297"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043629","reference_id":"2043629","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043629"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21297"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ge-ejs7-7ben"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80155?format=json","vulnerability_id":"VCID-e8ty-bkjz-5bh4","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2390","reference_id":"","reference_type":"","scores":[{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84294","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84428","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84363","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84385","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84414","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84423","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.8435","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84374","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84367","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2390"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992310","reference_id":"1992310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-881/","reference_id":"ZDI-21-881","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:17Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-881/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2390"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ty-bkjz-5bh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76858?format=json","vulnerability_id":"VCID-e9t1-br7a-zuc2","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21052.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21052.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21052","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24672","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2481","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24788","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24717","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24842","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24886","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24818","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21052"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275440","reference_id":"2275440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275440"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:13:41Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0012/","reference_id":"ntap-20240426-0012","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T15:13:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21052"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e9t1-br7a-zuc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/253332?format=json","vulnerability_id":"VCID-efvc-pezb-yuhw","summary":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35590","reference_id":"","reference_type":"","scores":[{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96579","published_at":"2026-04-29T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96537","published_at":"2026-04-02T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96567","published_at":"2026-04-16T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96575","published_at":"2026-04-21T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96576","published_at":"2026-04-24T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96528","published_at":"2026-04-01T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.96558","published_at":"2026-04-12T12:55:00Z"},{"value":"0.28894","scoring_system":"epss","scoring_elements":"0.9656","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35590"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1226/","reference_id":"ZDI-21-1226","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:55Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1226/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35590"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-efvc-pezb-yuhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57156?format=json","vulnerability_id":"VCID-eh72-pgfd-x3dy","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2070","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2070"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922405","reference_id":"1922405","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922405"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2070"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eh72-pgfd-x3dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73653?format=json","vulnerability_id":"VCID-en2e-w1q9-kydd","summary":"mysql: Information Schema unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21197.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21197.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21197","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33894","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33778","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21197"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318874","reference_id":"2318874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318874"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21197"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-en2e-w1q9-kydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56996?format=json","vulnerability_id":"VCID-ert5-smsw-1ba2","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14771","reference_id":"","reference_type":"","scores":[{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45237","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45185","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.4533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45381","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45377","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45327","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45238","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.4534","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45339","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.4536","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45329","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14771"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890740","reference_id":"1890740","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890740"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:55Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14771"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ert5-smsw-1ba2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79513?format=json","vulnerability_id":"VCID-esze-5kfz-sfea","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21478","reference_id":"","reference_type":"","scores":[{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56034","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55989","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56067","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56013","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56087","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56099","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56076","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56093","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21478"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082658","reference_id":"2082658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082658"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21478"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-esze-5kfz-sfea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79499?format=json","vulnerability_id":"VCID-ezwh-q7de-abey","summary":"mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21427","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22093","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21895","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22261","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22044","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22199","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082644","reference_id":"2082644","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082644"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:32Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6306","reference_id":"RHSA-2022:6306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6443","reference_id":"RHSA-2022:6443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"},{"reference_url":"https://usn.ubuntu.com/5739-1/","reference_id":"USN-5739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5739-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21427"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwh-q7de-abey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77816?format=json","vulnerability_id":"VCID-f1km-fnbx-hqba","summary":"mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20960","reference_id":"","reference_type":"","scores":[{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51155","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51186","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51193","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51211","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51207","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51261","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51238","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20960"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258771","reference_id":"2258771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20960"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f1km-fnbx-hqba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80144?format=json","vulnerability_id":"VCID-f2hn-79mj-fyer","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2356","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47584","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47608","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47642","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47595","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47588","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2356"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992299","reference_id":"1992299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992299"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2356"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f2hn-79mj-fyer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79512?format=json","vulnerability_id":"VCID-f6px-shha-wqcn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21462","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44156","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44321","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44367","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44355","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44378","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44401","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21462"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082657","reference_id":"2082657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082657"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:57Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21462"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f6px-shha-wqcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77818?format=json","vulnerability_id":"VCID-f6xm-t4e5-mkfv","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20962","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55448","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55454","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55549","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55552","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20962"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258773","reference_id":"2258773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20962"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f6xm-t4e5-mkfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73659?format=json","vulnerability_id":"VCID-f7wz-1e7k-ckf7","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21194.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21194.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21194","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30433","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30802","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30834","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3079","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30746","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3077","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3075","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30717","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21194"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318914","reference_id":"2318914","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318914"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21194"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f7wz-1e7k-ckf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73620?format=json","vulnerability_id":"VCID-f81r-m71k-ubck","summary":"mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21237.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21237.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21237","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2232","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2231","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22627","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22542","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22571","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2253","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22475","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21237"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318884","reference_id":"2318884","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318884"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21237"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f81r-m71k-ubck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76860?format=json","vulnerability_id":"VCID-fa4p-tdfz-skh4","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21054.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21054","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27486","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27336","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35619","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35547","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35582","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35537","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35543","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21054"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275443","reference_id":"2275443","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275443"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T15:09:39Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T15:09:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21054"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fa4p-tdfz-skh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78492?format=json","vulnerability_id":"VCID-fgud-y4d2-ekhu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21946.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21946.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21946","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44155","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44355","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44366","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21946"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188121","reference_id":"2188121","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188121"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21946"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fgud-y4d2-ekhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66837?format=json","vulnerability_id":"VCID-fhab-34dn-e7cd","summary":"mysql: DML unspecified vulnerability (CPU Oct 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53053.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53053","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14342","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53053"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543","reference_id":"1118543","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405486","reference_id":"2405486","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405486"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T19:36:20Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23008","reference_id":"RHSA-2025:23008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23109","reference_id":"RHSA-2025:23109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23111","reference_id":"RHSA-2025:23111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23134","reference_id":"RHSA-2025:23134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23137","reference_id":"RHSA-2025:23137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23137"},{"reference_url":"https://usn.ubuntu.com/7873-1/","reference_id":"USN-7873-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7873-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931427?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.44-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.44-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53053"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fhab-34dn-e7cd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79497?format=json","vulnerability_id":"VCID-fjxp-kyqj-7fgp","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21423","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21423"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082642","reference_id":"2082642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082642"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:34Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21423"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fjxp-kyqj-7fgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64971?format=json","vulnerability_id":"VCID-fkh4-tanz-qqdm","summary":"mysql: Thread Pooling unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21964.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21964.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21964","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14977","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21964"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115","reference_id":"1126115","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431431","reference_id":"2431431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431431"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:01:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4162","reference_id":"RHSA-2026:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4828","reference_id":"RHSA-2026:4828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5580","reference_id":"RHSA-2026:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5640","reference_id":"RHSA-2026:5640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6391","reference_id":"RHSA-2026:6391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6391"},{"reference_url":"https://usn.ubuntu.com/7994-1/","reference_id":"USN-7994-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7994-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21964"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fkh4-tanz-qqdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76847?format=json","vulnerability_id":"VCID-fm5p-8y7r-2bct","summary":"mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20994.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20994.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20994","reference_id":"","reference_type":"","scores":[{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6139","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61412","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61382","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61396","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61322","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61351","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61367","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61383","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61403","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61408","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20994"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275429","reference_id":"2275429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275429"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-02T20:54:35Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-02T20:54:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20994"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fm5p-8y7r-2bct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78267?format=json","vulnerability_id":"VCID-fn1h-hq5h-83fn","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22007.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22007","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14605","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14577","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14639","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14671","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14669","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14857","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1466","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14751","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14732","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14571","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22007"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224212","reference_id":"2224212","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224212"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:27Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22007"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fn1h-hq5h-83fn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80413?format=json","vulnerability_id":"VCID-fvuq-5szu-akfn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2298","reference_id":"","reference_type":"","scores":[{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.8142","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81409","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81416","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81343","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81346","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951779","reference_id":"1951779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951779"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2298"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fvuq-5szu-akfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78002?format=json","vulnerability_id":"VCID-fyah-c7dc-93gn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22026.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22026.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22026","reference_id":"","reference_type":"","scores":[{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34292","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34199","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34228","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34198","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33775","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33753","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35685","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245012","reference_id":"2245012","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6288-2/","reference_id":"USN-6288-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22026"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fyah-c7dc-93gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70386?format=json","vulnerability_id":"VCID-fz64-j67m-xkh8","summary":"mysql: MySQL Server: High privileged attacker can cause Denial of Service (DoS)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21583.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21583","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21583"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359968","reference_id":"2359968","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359968"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T19:50:38Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21583"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fz64-j67m-xkh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80420?format=json","vulnerability_id":"VCID-g1py-km6y-uka8","summary":"mysql: Server: Packaging unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2307","reference_id":"","reference_type":"","scores":[{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63453","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63594","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63567","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.636","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.6354","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63589","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63574","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63576","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2307"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951785","reference_id":"1951785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951785"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2307"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g1py-km6y-uka8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77824?format=json","vulnerability_id":"VCID-g2z6-qhe8-7fd1","summary":"mysql: Server: Options unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20968.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20968.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20968","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19569","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19619","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19605","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19702","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19834","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19836","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19709","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19711","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19724","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20968"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258779","reference_id":"2258779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20968"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g2z6-qhe8-7fd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64970?format=json","vulnerability_id":"VCID-g4mg-1vmb-cqdz","summary":"mysql: Pluggable Auth unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21965.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21965","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14977","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21965"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431429","reference_id":"2431429","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431429"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T19:57:17Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21965"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g4mg-1vmb-cqdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77830?format=json","vulnerability_id":"VCID-g57b-67q4-1bf3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20974","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17238","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17018","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17108","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17141","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17094","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16968","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17009","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20974"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258785","reference_id":"2258785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20974"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g57b-67q4-1bf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57160?format=json","vulnerability_id":"VCID-g58r-8vcn-bfea","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2087","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25508","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25661","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25644","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25858","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.257","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25717","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2087"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922408","reference_id":"1922408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922408"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2087"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g58r-8vcn-bfea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79775?format=json","vulnerability_id":"VCID-g6f6-1du9-ufhz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21254","reference_id":"","reference_type":"","scores":[{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78322","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78451","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78394","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78376","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78397","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78428","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78336","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01135","scoring_system":"epss","scoring_elements":"0.78362","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21254"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043623","reference_id":"2043623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043623"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21254"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g6f6-1du9-ufhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80382?format=json","vulnerability_id":"VCID-gb4c-ypuu-gfgq","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2164","reference_id":"","reference_type":"","scores":[{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79165","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2164"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951754","reference_id":"1951754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951754"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2164"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gb4c-ypuu-gfgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78020?format=json","vulnerability_id":"VCID-gbqx-1475-5ugs","summary":"mysql: Server: UDF unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22111.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22111.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22111","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22111"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245030","reference_id":"2245030","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22111"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbqx-1475-5ugs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57117?format=json","vulnerability_id":"VCID-getz-u39m-ubgv","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1998","reference_id":"","reference_type":"","scores":[{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51126","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51108","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51163","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51182","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51207","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51213","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51137","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51145","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.5115","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51107","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1998"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922378","reference_id":"1922378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922378"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-1998"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-getz-u39m-ubgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78757?format=json","vulnerability_id":"VCID-gf4v-xpef-8ygu","summary":"mysql: Server: GIS unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21887.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21887.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21887","reference_id":"","reference_type":"","scores":[{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.9777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97802","published_at":"2026-04-29T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97795","published_at":"2026-04-26T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97794","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21887"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162291","reference_id":"2162291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21887"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gf4v-xpef-8ygu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79977?format=json","vulnerability_id":"VCID-gk57-6tsn-4yhs","summary":"mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35632","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30999","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30567","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30914","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.309","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35632"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016119","reference_id":"2016119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016119"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35632"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gk57-6tsn-4yhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80377?format=json","vulnerability_id":"VCID-gkm2-f4yw-7bh6","summary":"mysql: Server: Parser unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2144.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2144","reference_id":"","reference_type":"","scores":[{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85858","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.8587","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.8594","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.8596","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85968","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85887","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85909","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85919","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85934","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85932","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85926","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02717","scoring_system":"epss","scoring_elements":"0.85945","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2144"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951749","reference_id":"1951749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4026","reference_id":"RHSA-2020:4026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2144"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gkm2-f4yw-7bh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80166?format=json","vulnerability_id":"VCID-gm7z-m589-77gy","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2426","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2426"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992320","reference_id":"1992320","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2426"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gm7z-m589-77gy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57136?format=json","vulnerability_id":"VCID-gmxv-dxp3-cuhq","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2028","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922391","reference_id":"1922391","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922391"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2028"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmxv-dxp3-cuhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79219?format=json","vulnerability_id":"VCID-gs25-yymm-e3ak","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21529","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21529"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115291","reference_id":"2115291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:22Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21529"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gs25-yymm-e3ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79795?format=json","vulnerability_id":"VCID-gu2a-fwhq-pqhs","summary":"mysql: Server: Components Services unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21368","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38733","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39137","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39049","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3884","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39169","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39132","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39113","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39168","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21368"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043643","reference_id":"2043643","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043643"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21368"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gu2a-fwhq-pqhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74819?format=json","vulnerability_id":"VCID-gw14-cg6h-zkgg","summary":"mysql: Connection Handling unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21134.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21134.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21134","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37638","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37755","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38038","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38065","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38029","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37968","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21134"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298318","reference_id":"2298318","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298318"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:41:07Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21134"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gw14-cg6h-zkgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79778?format=json","vulnerability_id":"VCID-gwce-mjav-abcz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21265","reference_id":"","reference_type":"","scores":[{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43267","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43441","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43426","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43485","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43474","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43409","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.4334","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43451","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.4344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43454","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21265"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043626","reference_id":"2043626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043626"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21265"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gwce-mjav-abcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70370?format=json","vulnerability_id":"VCID-gy45-yr7m-j3ef","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30703.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30703.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30703","reference_id":"","reference_type":"","scores":[{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.4744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.4747","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47461","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.4741","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47465","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47459","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47466","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47526","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47518","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30703"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359950","reference_id":"2359950","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359950"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:12:03Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30703"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gy45-yr7m-j3ef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78752?format=json","vulnerability_id":"VCID-h13j-2a9m-xfbk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21879.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21879","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32738","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33171","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33039","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32998","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21879"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162286","reference_id":"2162286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21879"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h13j-2a9m-xfbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57026?format=json","vulnerability_id":"VCID-h2r2-p8v7-sfc6","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14838","reference_id":"","reference_type":"","scores":[{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48171","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48208","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4829","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4824","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48221","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48233","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48235","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48254","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14838"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890765","reference_id":"1890765","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890765"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:38Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14838"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h2r2-p8v7-sfc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80152?format=json","vulnerability_id":"VCID-h558-qvwc-73hv","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2385","reference_id":"","reference_type":"","scores":[{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60475","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60483","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60491","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60489","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60473","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.6043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60397","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60462","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992307","reference_id":"1992307","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992307"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2385"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h558-qvwc-73hv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76846?format=json","vulnerability_id":"VCID-hfza-ubb9-gbea","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20993","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35383","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35783","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35734","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35469","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35808","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35794","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20993"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275428","reference_id":"2275428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275428"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0014/","reference_id":"ntap-20240426-0014","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0014/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20993"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hfza-ubb9-gbea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78495?format=json","vulnerability_id":"VCID-hgnv-zdsm-wuaz","summary":"mysql: Server: Partition unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21955.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21955.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21955","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21955"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188124","reference_id":"2188124","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188124"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21955"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgnv-zdsm-wuaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73615?format=json","vulnerability_id":"VCID-hhc8-m4x1-f3d8","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21239.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21239.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21239","reference_id":"","reference_type":"","scores":[{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64697","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64729","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64635","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6467","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64686","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64662","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64699","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6471","published_at":"2026-04-18T12:55:00Z"},{"value":"0.007","scoring_system":"epss","scoring_elements":"0.72074","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21239"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318927","reference_id":"2318927","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318927"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21239"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhc8-m4x1-f3d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79985?format=json","vulnerability_id":"VCID-hhep-s9mq-6kbb","summary":"mysql: Server: DDL unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35640","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30468","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30059","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30356","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30312","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30251","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30353","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30413","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30448","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30374","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016129","reference_id":"2016129","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016129"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35640"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhep-s9mq-6kbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57008?format=json","vulnerability_id":"VCID-hjkk-adkv-yfdu","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14799","reference_id":"","reference_type":"","scores":[{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46097","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46137","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4609","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46162","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4622","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46216","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4616","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.4614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46158","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46161","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46182","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46153","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890752","reference_id":"1890752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890752"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:15Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14799"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkk-adkv-yfdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78754?format=json","vulnerability_id":"VCID-hpqm-5m4j-q3cx","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21881.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21881.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21881","reference_id":"","reference_type":"","scores":[{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27766","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27328","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27511","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27666","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27617","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27591","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27552","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21881"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162288","reference_id":"2162288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21881"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hpqm-5m4j-q3cx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56997?format=json","vulnerability_id":"VCID-hrbc-2cpw-5be7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14773","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14773"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890742","reference_id":"1890742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890742"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14773"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hrbc-2cpw-5be7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71963?format=json","vulnerability_id":"VCID-hspu-8a9m-wqgx","summary":"mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21555.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21555.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21555","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33479","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3356","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34101","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34001","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33988","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33955","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21555"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339243","reference_id":"2339243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339243"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-22T15:01:44Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21555"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hspu-8a9m-wqgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79974?format=json","vulnerability_id":"VCID-hsue-93wh-mygh","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35629","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48128","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48243","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35629"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016116","reference_id":"2016116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016116"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35629"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hsue-93wh-mygh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77826?format=json","vulnerability_id":"VCID-hudn-9xy8-kudb","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20970","reference_id":"","reference_type":"","scores":[{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48627","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4862","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48572","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48639","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48613","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4867","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20970"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258781","reference_id":"2258781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20970"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hudn-9xy8-kudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78934?format=json","vulnerability_id":"VCID-huvv-nrxp-mbfq","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21625.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21625","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21625"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142871","reference_id":"2142871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142871"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21625"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-huvv-nrxp-mbfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79229?format=json","vulnerability_id":"VCID-hv87-q417-8qd3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21569","reference_id":"","reference_type":"","scores":[{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61698","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65138","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.6511","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65066","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65115","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21569"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115301","reference_id":"2115301","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21569"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hv87-q417-8qd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79966?format=json","vulnerability_id":"VCID-hwf4-mqxw-4ycq","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35612","reference_id":"","reference_type":"","scores":[{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59261","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59335","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59412","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5937","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5939","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59388","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59407","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59373","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59405","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35612"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016107","reference_id":"2016107","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016107"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:31Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35612"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hwf4-mqxw-4ycq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76861?format=json","vulnerability_id":"VCID-hyn3-nyeu-8bdw","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21055","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32856","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3282","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32671","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32878","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21055"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275444","reference_id":"2275444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275444"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0011/","reference_id":"ntap-20240426-0011","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0011/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21055"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hyn3-nyeu-8bdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76865?format=json","vulnerability_id":"VCID-j5dm-qp9g-uygv","summary":"mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21061","reference_id":"","reference_type":"","scores":[{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35792","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36194","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36142","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36323","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36157","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36225","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36193","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36209","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21061"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275448","reference_id":"2275448","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275448"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0014/","reference_id":"ntap-20240426-0014","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0014/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21061"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j5dm-qp9g-uygv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73651?format=json","vulnerability_id":"VCID-j5f6-pte2-w7bg","summary":"mysql: Optimizer unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21201.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21201","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36889","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36662","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.37048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.37081","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36972","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43049","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21201"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318882","reference_id":"2318882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318882"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21201"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j5f6-pte2-w7bg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80164?format=json","vulnerability_id":"VCID-j6as-4yhs-dyhq","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2424","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2424"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992318","reference_id":"1992318","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2424"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6as-4yhs-dyhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80148?format=json","vulnerability_id":"VCID-j734-hefa-1yaa","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2372","reference_id":"","reference_type":"","scores":[{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49828","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.4985","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49893","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.4991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49883","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49928","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49929","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49901","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49895","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992303","reference_id":"1992303","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992303"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/","reference_id":"2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://security.archlinux.org/AVG-2226","reference_id":"AVG-2226","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2226"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1007","reference_id":"RHSA-2022:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1010","reference_id":"RHSA-2022:1010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1556","reference_id":"RHSA-2022:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1557","reference_id":"RHSA-2022:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4818","reference_id":"RHSA-2022:4818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-2/","reference_id":"USN-5022-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-2/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/","reference_id":"VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2372"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j734-hefa-1yaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57021?format=json","vulnerability_id":"VCID-jate-mc8k-13gn","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14830","reference_id":"","reference_type":"","scores":[{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70779","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.7087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70934","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70787","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70854","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14830"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890762","reference_id":"1890762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890762"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:48Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14830"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jate-mc8k-13gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74833?format=json","vulnerability_id":"VCID-jha2-d9sf-sfbf","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21177.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21177","reference_id":"","reference_type":"","scores":[{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62111","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62102","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62118","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62066","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62104","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62093","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62072","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62115","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.6212","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21177"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298354","reference_id":"2298354","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298354"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:35:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21177"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jha2-d9sf-sfbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77822?format=json","vulnerability_id":"VCID-jhke-e5qv-dua9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20966","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44238","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44325","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20966"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258777","reference_id":"2258777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20966"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jhke-e5qv-dua9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79955?format=json","vulnerability_id":"VCID-jkxq-q4u2-6fb6","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35575","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60158","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60292","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60313","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60321","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60328","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60314","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60285","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60301","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.6026","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60228","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35575"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016094","reference_id":"2016094","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016094"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35575"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jkxq-q4u2-6fb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80393?format=json","vulnerability_id":"VCID-jntg-92ur-nbfa","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2193","reference_id":"","reference_type":"","scores":[{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79165","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2193"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951763","reference_id":"1951763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951763"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2193"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jntg-92ur-nbfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76867?format=json","vulnerability_id":"VCID-jp8s-h3s5-p7hh","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21069.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21069.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21069","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36826","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.3717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36914","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47898","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47885","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47939","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47933","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21069"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275450","reference_id":"2275450","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275450"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T15:07:00Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T15:07:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21069"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jp8s-h3s5-p7hh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71988?format=json","vulnerability_id":"VCID-jpqr-hknn-6fd9","summary":"mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21490.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21490","reference_id":"","reference_type":"","scores":[{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53082","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53099","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00349","scoring_system":"epss","scoring_elements":"0.57478","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00349","scoring_system":"epss","scoring_elements":"0.57407","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00349","scoring_system":"epss","scoring_elements":"0.57453","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00349","scoring_system":"epss","scoring_elements":"0.57474","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60175","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60941","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61154","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63593","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63619","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339221","reference_id":"2339221","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339221"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T19:32:41Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19572","reference_id":"RHSA-2025:19572","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19572"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19584","reference_id":"RHSA-2025:19584","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19584"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0247","reference_id":"RHSA-2026:0247","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0334","reference_id":"RHSA-2026:0334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0335","reference_id":"RHSA-2026:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6435","reference_id":"RHSA-2026:6435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6435"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"},{"reference_url":"https://usn.ubuntu.com/7376-1/","reference_id":"USN-7376-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7376-1/"},{"reference_url":"https://usn.ubuntu.com/7376-2/","reference_id":"USN-7376-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7376-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21490"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jpqr-hknn-6fd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68652?format=json","vulnerability_id":"VCID-js8b-9x3r-v3ea","summary":"mysql: mysqldump unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50081.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50081","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1762","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17681","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17853","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17888","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18071","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17974","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18006","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50081"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380273","reference_id":"2380273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380273"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:17:01Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50081"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-js8b-9x3r-v3ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73648?format=json","vulnerability_id":"VCID-jv6k-hx8z-zbd3","summary":"mysql: FTS unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21203.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21203.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21203","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33469","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33448","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33978","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33863","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33861","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39149","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21203"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318885","reference_id":"2318885","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318885"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21203"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jv6k-hx8z-zbd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79216?format=json","vulnerability_id":"VCID-jvss-882h-63bb","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21526","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41591","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21526"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115288","reference_id":"2115288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21526"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvss-882h-63bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70373?format=json","vulnerability_id":"VCID-jvtz-xran-p3e4","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30695.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30695","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30695"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359947","reference_id":"2359947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359947"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T20:01:49Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30695"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtz-xran-p3e4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78943?format=json","vulnerability_id":"VCID-jxwh-abnr-bkew","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39408.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39408","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37412","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37385","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37357","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37138","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37434","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39408"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142880","reference_id":"2142880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142880"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-39408"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxwh-abnr-bkew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78483?format=json","vulnerability_id":"VCID-jyys-fjmd-cbhw","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21913.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21913","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39203","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39201","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40141","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6306","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21913"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188111","reference_id":"2188111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188111"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21913"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jyys-fjmd-cbhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78008?format=json","vulnerability_id":"VCID-jzd8-k3th-6uc1","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22066.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22066.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22066","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22066"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245018","reference_id":"2245018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245018"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22066"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzd8-k3th-6uc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79969?format=json","vulnerability_id":"VCID-k1mw-4auu-v7em","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35624","reference_id":"","reference_type":"","scores":[{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53371","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53424","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53477","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53421","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.5339","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53442","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53438","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53487","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.5347","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53454","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00301","scoring_system":"epss","scoring_elements":"0.53491","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35624"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016110","reference_id":"2016110","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016110"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://usn.ubuntu.com/5123-2/","reference_id":"USN-5123-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35624"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k1mw-4auu-v7em"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78930?format=json","vulnerability_id":"VCID-k26n-5mxy-w7ak","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21607","reference_id":"","reference_type":"","scores":[{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64861","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64865","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66899","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66901","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66917","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21607"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142867","reference_id":"2142867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142867"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21607"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k26n-5mxy-w7ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79978?format=json","vulnerability_id":"VCID-k37x-pg16-bqbb","summary":"mysql: Server: Logging unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35633","reference_id":"","reference_type":"","scores":[{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39921","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40268","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40003","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40311","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40233","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40285","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40252","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40299","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35633"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016120","reference_id":"2016120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016120"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35633"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k37x-pg16-bqbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80423?format=json","vulnerability_id":"VCID-k3vn-aruy-nfan","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2174","reference_id":"","reference_type":"","scores":[{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76249","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76296","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76336","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76314","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7631","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76355","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76374","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76382","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76284","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76264","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1952802","reference_id":"1952802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1952802"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2174"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3vn-aruy-nfan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57031?format=json","vulnerability_id":"VCID-k4fk-qkr8-1uac","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14846","reference_id":"","reference_type":"","scores":[{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70779","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.7087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70934","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70787","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70854","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890769","reference_id":"1890769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890769"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:29Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14846"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k4fk-qkr8-1uac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64965?format=json","vulnerability_id":"VCID-k79k-zp3y-jfcx","summary":"mysql: Optimizer unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21950.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21950.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21950","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16422","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16466","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16531","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16539","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21950"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431400","reference_id":"2431400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431400"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:16:52Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21950"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k79k-zp3y-jfcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64966?format=json","vulnerability_id":"VCID-kc41-puex-5bfr","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21936.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21936","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14977","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21936"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115","reference_id":"1126115","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431402","reference_id":"2431402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431402"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:57:44Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4162","reference_id":"RHSA-2026:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4828","reference_id":"RHSA-2026:4828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5580","reference_id":"RHSA-2026:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5640","reference_id":"RHSA-2026:5640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6391","reference_id":"RHSA-2026:6391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6391"},{"reference_url":"https://usn.ubuntu.com/7994-1/","reference_id":"USN-7994-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7994-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21936"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kc41-puex-5bfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71965?format=json","vulnerability_id":"VCID-kc65-j2c9-zbb4","summary":"mysql: MySQL Server: Denial of Service via network access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21543.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21543","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24425","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21543"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339247","reference_id":"2339247","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339247"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:10:23Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21543"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kc65-j2c9-zbb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80389?format=json","vulnerability_id":"VCID-kff6-5fr1-1khv","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2172","reference_id":"","reference_type":"","scores":[{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.79972","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.79979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80101","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.79991","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80019","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80048","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80031","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80024","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80052","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80053","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80086","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80001","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951759","reference_id":"1951759","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951759"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2172"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kff6-5fr1-1khv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79989?format=json","vulnerability_id":"VCID-kg95-ffr7-fkh8","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35644","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35644"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016133","reference_id":"2016133","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016133"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35644"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kg95-ffr7-fkh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78491?format=json","vulnerability_id":"VCID-khzk-mgcw-3ff6","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21945.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21945","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21945"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188120","reference_id":"2188120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188120"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21945"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-khzk-mgcw-3ff6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57131?format=json","vulnerability_id":"VCID-kjbh-uhvg-b7am","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2020.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2020.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2020","reference_id":"","reference_type":"","scores":[{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82573","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.8261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82631","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82689","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01766","scoring_system":"epss","scoring_elements":"0.82584","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2020"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922387","reference_id":"1922387","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922387"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931410?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.21-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.21-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2020"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kjbh-uhvg-b7am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77833?format=json","vulnerability_id":"VCID-knap-u7y6-duhy","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20977","reference_id":"","reference_type":"","scores":[{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47637","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47756","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47749","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47682","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47701","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20977"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258788","reference_id":"2258788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258788"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:39:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20977"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-knap-u7y6-duhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79505?format=json","vulnerability_id":"VCID-krjf-4xbf-s3dd","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21444","reference_id":"","reference_type":"","scores":[{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58539","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58495","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58466","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58518","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58541","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58521","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58501","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082650","reference_id":"2082650","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082650"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21444"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-krjf-4xbf-s3dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73646?format=json","vulnerability_id":"VCID-kv1r-99zt-ubea","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21207.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21207","reference_id":"","reference_type":"","scores":[{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44907","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44915","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45034","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45001","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.45047","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44998","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21207"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318877","reference_id":"2318877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318877"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.38_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.38_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.38_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931422?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.39-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.39-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21207"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kv1r-99zt-ubea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78271?format=json","vulnerability_id":"VCID-kvrm-v55z-q7gh","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22046.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22046.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22046","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13528","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13751","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13713","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13663","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13645","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13656","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1365","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22046"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224216","reference_id":"2224216","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224216"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22046"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kvrm-v55z-q7gh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57138?format=json","vulnerability_id":"VCID-kwfb-kbpq-pkck","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2031","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2031"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922393","reference_id":"1922393","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922393"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2031"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfb-kbpq-pkck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78940?format=json","vulnerability_id":"VCID-kyj1-d2zy-83f5","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21640.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21640","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21640"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142877","reference_id":"2142877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142877"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21640"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kyj1-d2zy-83f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57158?format=json","vulnerability_id":"VCID-m2ey-feyg-ufb7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2076","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2076"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922407","reference_id":"1922407","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922407"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2076"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m2ey-feyg-ufb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70391?format=json","vulnerability_id":"VCID-m58f-191g-1ufj","summary":"mysql: Parser unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21575.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21575.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21575","reference_id":"","reference_type":"","scores":[{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49669","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.4966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49694","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49647","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49732","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49704","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21575"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359934","reference_id":"2359934","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359934"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:44:39Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21575"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m58f-191g-1ufj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68641?format=json","vulnerability_id":"VCID-m8zz-1eff-8kdc","summary":"mysql: DDL unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50093.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50093.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50093","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50093"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380290","reference_id":"2380290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380290"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T13:45:54Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50093"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m8zz-1eff-8kdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70366?format=json","vulnerability_id":"VCID-m95s-8qmw-kqe5","summary":"mysql: Components Services unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30715.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30715","reference_id":"","reference_type":"","scores":[{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54291","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54332","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54341","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54355","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54296","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54343","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54374","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54353","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54377","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30715"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359900","reference_id":"2359900","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359900"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:04:57Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30715"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m95s-8qmw-kqe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78745?format=json","vulnerability_id":"VCID-m997-zjm1-uffn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21872","reference_id":"","reference_type":"","scores":[{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65134","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65112","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65105","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21872"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162279","reference_id":"2162279","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21872"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m997-zjm1-uffn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66840?format=json","vulnerability_id":"VCID-me6u-rxvf-5fgu","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53045.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53045.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53045","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14342","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53045"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543","reference_id":"1118543","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405523","reference_id":"2405523","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405523"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T16:09:33Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23008","reference_id":"RHSA-2025:23008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23109","reference_id":"RHSA-2025:23109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23111","reference_id":"RHSA-2025:23111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23134","reference_id":"RHSA-2025:23134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23137","reference_id":"RHSA-2025:23137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23137"},{"reference_url":"https://usn.ubuntu.com/7873-1/","reference_id":"USN-7873-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7873-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931427?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.44-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.44-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53045"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-me6u-rxvf-5fgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71981?format=json","vulnerability_id":"VCID-mhmg-hgaw-guam","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21503.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21503","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24425","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21503"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339291","reference_id":"2339291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339291"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:24:57Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21503"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mhmg-hgaw-guam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/253357?format=json","vulnerability_id":"VCID-mjkd-v9e6-cbbt","summary":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 1.8 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35618","reference_id":"","reference_type":"","scores":[{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55304","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55327","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.5539","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.5531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55331","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55351","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55333","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55383","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55384","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55394","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55373","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55354","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35618"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"1.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35618"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjkd-v9e6-cbbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71980?format=json","vulnerability_id":"VCID-mjrn-9eaq-9fd9","summary":"mysql: MySQL Server: Denial of Service vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21501.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21501.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21501","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3823","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38211","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38144","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21501"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339271","reference_id":"2339271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339271"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:32:20Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21501"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mjrn-9eaq-9fd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79220?format=json","vulnerability_id":"VCID-mq1t-yqxh-rkhv","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21530","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21530"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115292","reference_id":"2115292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115292"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21530"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mq1t-yqxh-rkhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73625?format=json","vulnerability_id":"VCID-mt45-5esq-j7hn","summary":"mysql: Client programs unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21231.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21231.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21231","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38304","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38043","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38019","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38362","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38268","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38244","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38291","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48573","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21231"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318873","reference_id":"2318873","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318873"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21231"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mt45-5esq-j7hn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78734?format=json","vulnerability_id":"VCID-muua-g6dy-6ub1","summary":"mysql: Server: DML unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21836.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21836","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32314","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32769","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32585","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21836"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162268","reference_id":"2162268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21836"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-muua-g6dy-6ub1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57165?format=json","vulnerability_id":"VCID-muzn-dqpe-q7cr","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2180","reference_id":"","reference_type":"","scores":[{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.8918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89134","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.8915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89171","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89176","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2180"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951762","reference_id":"1951762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951762"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.gentoo.org/glsa/202105-28","reference_id":"GLSA-202105-28","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-28"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2180"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-muzn-dqpe-q7cr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57125?format=json","vulnerability_id":"VCID-my1q-4m9d-9fgj","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2011","reference_id":"","reference_type":"","scores":[{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84153","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84167","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.8425","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84274","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84284","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84186","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2011"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922384","reference_id":"1922384","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922384"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210622-0001/","reference_id":"ntap-20210622-0001","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210622-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2327","reference_id":"RHSA-2019:2327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2011"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-my1q-4m9d-9fgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78494?format=json","vulnerability_id":"VCID-mydc-k3wq-bkc2","summary":"mysql: Server: Partition unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21953.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21953.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21953","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21953"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188123","reference_id":"2188123","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188123"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21953"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mydc-k3wq-bkc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71964?format=json","vulnerability_id":"VCID-n29s-edfg-ybbz","summary":"mysql: Privilege Misuse in MySQL Server Security Component","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21546.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21546","reference_id":"","reference_type":"","scores":[{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26278","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25945","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25997","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25993","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2632","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26208","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26216","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.2617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26094","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26058","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21546"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339299","reference_id":"2339299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339299"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T17:58:06Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21546"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n29s-edfg-ybbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76862?format=json","vulnerability_id":"VCID-n2yw-1gc2-jqgf","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21056.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21056.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21056","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27715","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27986","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27903","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36323","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36157","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36225","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36193","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36209","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36194","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275445","reference_id":"2275445","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275445"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:43:27Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0012/","reference_id":"ntap-20240426-0012","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:43:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21056"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n2yw-1gc2-jqgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80149?format=json","vulnerability_id":"VCID-n7tf-y62f-wyfe","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2374","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37312","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37367","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37386","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37368","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37061","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37499","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37327","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3739","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2374"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992304","reference_id":"1992304","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2374"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7tf-y62f-wyfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57161?format=json","vulnerability_id":"VCID-n9r2-crxf-jfh7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2088","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25508","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25661","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25644","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25858","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.257","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25717","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2088"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922410","reference_id":"1922410","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922410"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2088"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n9r2-crxf-jfh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78009?format=json","vulnerability_id":"VCID-nc2b-kkpu-1kac","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22068.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22068.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22068","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07595","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.076","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07639","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08375","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22068"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245019","reference_id":"2245019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22068"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nc2b-kkpu-1kac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57015?format=json","vulnerability_id":"VCID-ndhs-j4q8-zkf8","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14821","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14821"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890758","reference_id":"1890758","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890758"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:53Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14821"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ndhs-j4q8-zkf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78493?format=json","vulnerability_id":"VCID-ngqt-qntm-hugw","summary":"mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21947.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21947","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21947"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188122","reference_id":"2188122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188122"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21947"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngqt-qntm-hugw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79504?format=json","vulnerability_id":"VCID-nh7n-qv9q-8bda","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21440","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51005","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5111","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51066","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21440"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082649","reference_id":"2082649","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082649"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21440"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nh7n-qv9q-8bda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80379?format=json","vulnerability_id":"VCID-njb2-z4kz-zybs","summary":"mysql: Server: Options unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2146","reference_id":"","reference_type":"","scores":[{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82369","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82451","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82397","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951751","reference_id":"1951751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951751"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2146"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njb2-z4kz-zybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/253342?format=json","vulnerability_id":"VCID-njee-wqeh-dyf1","summary":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35598","reference_id":"","reference_type":"","scores":[{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97308","published_at":"2026-04-29T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97292","published_at":"2026-04-13T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97303","published_at":"2026-04-18T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97269","published_at":"2026-04-01T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97279","published_at":"2026-04-04T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.9728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97287","published_at":"2026-04-08T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97288","published_at":"2026-04-09T12:55:00Z"},{"value":"0.39342","scoring_system":"epss","scoring_elements":"0.97291","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35598"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1230/","reference_id":"ZDI-21-1230","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:50Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1230/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35598"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njee-wqeh-dyf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78266?format=json","vulnerability_id":"VCID-njfq-ur78-bqgs","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22005.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22005.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22005","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13354","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13434","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13407","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13424","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22005"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224211","reference_id":"2224211","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224211"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22005"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njfq-ur78-bqgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57030?format=json","vulnerability_id":"VCID-njkb-a6xx-wke9","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14845","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14845"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890768","reference_id":"1890768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890768"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:31Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14845"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njkb-a6xx-wke9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79800?format=json","vulnerability_id":"VCID-nn19-u26n-6qdd","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21379","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043648","reference_id":"2043648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043648"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21379"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nn19-u26n-6qdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79791?format=json","vulnerability_id":"VCID-npk1-jstp-bkc7","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21352","reference_id":"","reference_type":"","scores":[{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52591","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52642","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52625","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52611","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52649","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21352"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043639","reference_id":"2043639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043639"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21352"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-npk1-jstp-bkc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79952?format=json","vulnerability_id":"VCID-nprc-6br4-gfdj","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2481","reference_id":"","reference_type":"","scores":[{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.7138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71388","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.7144","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71422","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71473","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71453","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71511","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00674","scoring_system":"epss","scoring_elements":"0.71406","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2481"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016091","reference_id":"2016091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016091"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2481"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nprc-6br4-gfdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70371?format=json","vulnerability_id":"VCID-nu8m-ttvf-2qg5","summary":"mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30699.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30699.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30699","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30699"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359892","reference_id":"2359892","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359892"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T20:00:30Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30699"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nu8m-ttvf-2qg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73607?format=json","vulnerability_id":"VCID-nydj-bmj8-h3h5","summary":"mysql: Telemetry unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21244.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21244","reference_id":"","reference_type":"","scores":[{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49264","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49261","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49252","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49255","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49273","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49298","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49295","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21244"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318879","reference_id":"2318879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318879"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21244"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nydj-bmj8-h3h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57148?format=json","vulnerability_id":"VCID-p15d-cz1g-hucw","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2056","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922419","reference_id":"1922419","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922419"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2056"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p15d-cz1g-hucw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78939?format=json","vulnerability_id":"VCID-p2hz-hqhw-zqhk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21638","reference_id":"","reference_type":"","scores":[{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64841","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64815","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64845","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64738","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64779","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64817","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21638"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142876","reference_id":"2142876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142876"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21638"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2hz-hqhw-zqhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79786?format=json","vulnerability_id":"VCID-p341-9tza-nkcs","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21339","reference_id":"","reference_type":"","scores":[{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59796","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59789","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59778","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59762","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043634","reference_id":"2043634","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043634"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21339"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p341-9tza-nkcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80395?format=json","vulnerability_id":"VCID-p559-ueva-ffgv","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2196","reference_id":"","reference_type":"","scores":[{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79165","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2196"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951765","reference_id":"1951765","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951765"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2196"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p559-ueva-ffgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78277?format=json","vulnerability_id":"VCID-p56t-h63z-9yhb","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22058.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22058","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35272","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35668","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35691","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35656","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35673","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35374","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35622","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22058"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224222","reference_id":"2224222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224222"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22058"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p56t-h63z-9yhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80414?format=json","vulnerability_id":"VCID-p6g6-hqgv-vuce","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2299","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2299"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951780","reference_id":"1951780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951780"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2299"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p6g6-hqgv-vuce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64962?format=json","vulnerability_id":"VCID-p6ga-zq51-s7bf","summary":"mysql: Parser unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21952.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21952","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14977","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21952"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431381","reference_id":"2431381","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431381"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:20:25Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21952"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p6ga-zq51-s7bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68632?format=json","vulnerability_id":"VCID-p84e-pff5-cyh3","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50102.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50102","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50102"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380335","reference_id":"2380335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380335"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:04:03Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50102"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p84e-pff5-cyh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73655?format=json","vulnerability_id":"VCID-paqq-yb9n-v3h1","summary":"mysql: DDL unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21198.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21198.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21198","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33894","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33778","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21198"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318925","reference_id":"2318925","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318925"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21198"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-paqq-yb9n-v3h1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57044?format=json","vulnerability_id":"VCID-pawh-67dd-xbay","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14868","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14868"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890776","reference_id":"1890776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890776"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:10Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14868"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pawh-67dd-xbay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66838?format=json","vulnerability_id":"VCID-pbex-tqv2-6ya5","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53054.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53054","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14342","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53054"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543","reference_id":"1118543","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405514","reference_id":"2405514","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405514"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T19:37:06Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23008","reference_id":"RHSA-2025:23008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23109","reference_id":"RHSA-2025:23109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23111","reference_id":"RHSA-2025:23111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23134","reference_id":"RHSA-2025:23134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23137","reference_id":"RHSA-2025:23137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23137"},{"reference_url":"https://usn.ubuntu.com/7873-1/","reference_id":"USN-7873-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7873-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931427?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.44-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.44-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53054"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pbex-tqv2-6ya5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74834?format=json","vulnerability_id":"VCID-pc2n-hxy8-3kg7","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21179.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21179","reference_id":"","reference_type":"","scores":[{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56312","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56315","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56334","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56355","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56358","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56414","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56427","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56402","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56383","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56415","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00335","scoring_system":"epss","scoring_elements":"0.56387","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21179"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298356","reference_id":"2298356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298356"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:46:17Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21179"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pc2n-hxy8-3kg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78276?format=json","vulnerability_id":"VCID-pe84-64en-63dk","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22057.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22057.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22057","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18053","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17974","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17929","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17823","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17833","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18108","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17809","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22057"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224221","reference_id":"2224221","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224221"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22057"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pe84-64en-63dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/253362?format=json","vulnerability_id":"VCID-pez6-qjvg-jke6","summary":"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35621","reference_id":"","reference_type":"","scores":[{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90848","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.9092","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90931","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90842","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90858","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90869","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.9088","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06237","scoring_system":"epss","scoring_elements":"0.90896","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35621"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:45Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1232/","reference_id":"ZDI-21-1232","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:45Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1232/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35621"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pez6-qjvg-jke6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68638?format=json","vulnerability_id":"VCID-pf84-67ry-w3b5","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50095.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50095.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50095","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27639","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27531","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27849","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27756","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27691","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50095"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380269","reference_id":"2380269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380269"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T13:45:04Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50095"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pf84-67ry-w3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56995?format=json","vulnerability_id":"VCID-pfkc-qtn3-skgp","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14769","reference_id":"","reference_type":"","scores":[{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80644","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.8067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80724","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80768","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14769"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890739","reference_id":"1890739","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890739"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14769"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pfkc-qtn3-skgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71969?format=json","vulnerability_id":"VCID-pjap-71y9-7ydt","summary":"mysql: MySQL Server: Denial of Service (DoS) via network access by a high privileged attacker","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21531.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21531","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24425","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21531"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339231","reference_id":"2339231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339231"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:29:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21531"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pjap-71y9-7ydt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56994?format=json","vulnerability_id":"VCID-pmhc-1rhq-gfeb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14765","reference_id":"","reference_type":"","scores":[{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82525","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82667","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.8255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82576","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82584","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82602","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82596","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82629","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.8265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82661","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890738","reference_id":"1890738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890738"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/","reference_id":"JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/","reference_id":"OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14765"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79964?format=json","vulnerability_id":"VCID-pq5z-fp69-sufy","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35608","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.57978","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58062","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58059","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58113","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58117","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58133","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5811","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58122","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58063","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58084","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35608"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016105","reference_id":"2016105","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016105"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35608"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pq5z-fp69-sufy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78481?format=json","vulnerability_id":"VCID-prbq-dh9s-bqas","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21911.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21911","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21911"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188109","reference_id":"2188109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21911"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-prbq-dh9s-bqas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57037?format=json","vulnerability_id":"VCID-ptkb-y547-skg4","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14860","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40685","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40769","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4049","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40745","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40759","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40681","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40585","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40772","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40798","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40763","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14860"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890772","reference_id":"1890772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890772"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:17Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14860"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkb-y547-skg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79967?format=json","vulnerability_id":"VCID-pw3f-uc38-5qcb","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35622","reference_id":"","reference_type":"","scores":[{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.4588","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45848","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.46003","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45998","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45948","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45896","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45952","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45951","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016108","reference_id":"2016108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016108"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35622"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pw3f-uc38-5qcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74814?format=json","vulnerability_id":"VCID-q19r-b2d4-xue8","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20996.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20996.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20996","reference_id":"","reference_type":"","scores":[{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39149","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39245","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.3923","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39547","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.3952","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39503","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39441","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20996"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298307","reference_id":"2298307","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298307"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:10:59Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20996"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q19r-b2d4-xue8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76864?format=json","vulnerability_id":"VCID-q1ba-y5xr-sbdp","summary":"mysql: Server: Data Dictionary unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21060.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21060","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.2985","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3015","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30035","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.2992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30281","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30206","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30201","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30169","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21060"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275447","reference_id":"2275447","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275447"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:20:59Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-18T16:20:59Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21060"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q1ba-y5xr-sbdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79956?format=json","vulnerability_id":"VCID-q2q2-ubam-fbh9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35577","reference_id":"","reference_type":"","scores":[{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.53998","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54016","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54056","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54019","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5407","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54117","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54099","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54082","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54125","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54072","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54083","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54042","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35577"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016095","reference_id":"2016095","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016095"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35577"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q2q2-ubam-fbh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64968?format=json","vulnerability_id":"VCID-q2wn-m3ng-cqcm","summary":"mysql: DDL unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21937.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21937.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21937","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14977","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21937"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115","reference_id":"1126115","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431413","reference_id":"2431413","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431413"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:58:18Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4162","reference_id":"RHSA-2026:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4828","reference_id":"RHSA-2026:4828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5580","reference_id":"RHSA-2026:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5640","reference_id":"RHSA-2026:5640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6391","reference_id":"RHSA-2026:6391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6391"},{"reference_url":"https://usn.ubuntu.com/7994-1/","reference_id":"USN-7994-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7994-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21937"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q2wn-m3ng-cqcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79776?format=json","vulnerability_id":"VCID-q4rs-91hh-yfe7","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21256","reference_id":"","reference_type":"","scores":[{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5819","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5826","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58237","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58227","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58204","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58238","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21256"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043624","reference_id":"2043624","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043624"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21256"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q4rs-91hh-yfe7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73608?format=json","vulnerability_id":"VCID-q8v9-gdfq-nycp","summary":"mysql: Telemetry unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21243.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21243.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21243","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48127","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48171","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48181","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48177","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48189","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21243"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318896","reference_id":"2318896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318896"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21243"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8v9-gdfq-nycp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79957?format=json","vulnerability_id":"VCID-q9ns-sgyb-1bee","summary":"mysql: Server: Windows unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35583.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35583","reference_id":"","reference_type":"","scores":[{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81195","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.8133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81296","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81318","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81325","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81226","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.8128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81266","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81258","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35583"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016096","reference_id":"2016096","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016096"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:32:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35583"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q9ns-sgyb-1bee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76852?format=json","vulnerability_id":"VCID-qads-r36q-73h8","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21013.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21013.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21013","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.2985","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30035","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.2992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38805","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38868","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38881","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38862","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3884","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21013"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275434","reference_id":"2275434","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275434"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T18:49:22Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T18:49:22Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21013"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qads-r36q-73h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79950?format=json","vulnerability_id":"VCID-qbyx-gq4t-rkhd","summary":"mysql: Server: DML unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2478","reference_id":"","reference_type":"","scores":[{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61805","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61972","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.6193","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61969","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61957","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61937","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61979","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61983","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61965","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.6198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.6191","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61881","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2478"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016089","reference_id":"2016089","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016089"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2478"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qbyx-gq4t-rkhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57012?format=json","vulnerability_id":"VCID-qe1p-f4h5-uyga","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14812","reference_id":"","reference_type":"","scores":[{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80331","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80466","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80347","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80405","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.8039","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80383","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80412","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80442","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80449","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890756","reference_id":"1890756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890756"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/","reference_id":"JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/","reference_id":"OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14812"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79772?format=json","vulnerability_id":"VCID-qhmn-p8zd-9qeh","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21245","reference_id":"","reference_type":"","scores":[{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38659","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39096","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39059","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39038","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39093","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39063","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38979","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38771","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.38747","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39097","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39083","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21245"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043620","reference_id":"2043620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043620"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"},{"reference_url":"https://usn.ubuntu.com/5270-2/","reference_id":"USN-5270-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21245"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qhmn-p8zd-9qeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68647?format=json","vulnerability_id":"VCID-qj8p-nq94-73hw","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50085.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50085","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29724","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29771","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30085","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3005","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30029","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29984","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50085"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380295","reference_id":"2380295","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380295"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T19:39:53Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50085"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qj8p-nq94-73hw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79514?format=json","vulnerability_id":"VCID-qp52-bkgp-bbfu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21479","reference_id":"","reference_type":"","scores":[{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53486","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.5356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53523","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53514","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.5351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53559","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53525","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21479"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082659","reference_id":"2082659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082659"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:45Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21479"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qp52-bkgp-bbfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80418?format=json","vulnerability_id":"VCID-qqae-rsw8-x7gp","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2304","reference_id":"","reference_type":"","scores":[{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52023","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52071","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52175","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52104","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52111","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52097","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52062","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52112","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52172","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2304"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951783","reference_id":"1951783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951783"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2304"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqae-rsw8-x7gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79496?format=json","vulnerability_id":"VCID-qqbf-2xy3-k3bs","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21418","reference_id":"","reference_type":"","scores":[{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36008","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36404","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36349","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36095","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3641","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3643","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36402","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36421","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082641","reference_id":"2082641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082641"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:36Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21418"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqbf-2xy3-k3bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79226?format=json","vulnerability_id":"VCID-qra2-ejj6-sqgv","summary":"mysql: Server: Federated unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21547","reference_id":"","reference_type":"","scores":[{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55791","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58885","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58908","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58909","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21547"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115298","reference_id":"2115298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21547"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qra2-ejj6-sqgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57007?format=json","vulnerability_id":"VCID-qrcr-rtqs-f3g7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14794","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890751","reference_id":"1890751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890751"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14794"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qrcr-rtqs-f3g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78274?format=json","vulnerability_id":"VCID-qt3k-tebq-7fhr","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22054.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22054","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13354","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13434","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13407","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13424","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22054"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224219","reference_id":"2224219","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224219"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:28:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22054"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qt3k-tebq-7fhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79954?format=json","vulnerability_id":"VCID-qtjn-m9ak-6ye1","summary":"mysql: Server: Replication unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35546","reference_id":"","reference_type":"","scores":[{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67326","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67415","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67439","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67451","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.6746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67385","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35546"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016093","reference_id":"2016093","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016093"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35546"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtjn-m9ak-6ye1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80154?format=json","vulnerability_id":"VCID-qv7j-a4nn-97f7","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2389","reference_id":"","reference_type":"","scores":[{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68107","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68028","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68042","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68066","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68052","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68054","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68067","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.6805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68093","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68101","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67979","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992309","reference_id":"1992309","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992309"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/","reference_id":"2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"},{"reference_url":"https://security.archlinux.org/AVG-2226","reference_id":"AVG-2226","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1007","reference_id":"RHSA-2022:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1010","reference_id":"RHSA-2022:1010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1556","reference_id":"RHSA-2022:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1557","reference_id":"RHSA-2022:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4818","reference_id":"RHSA-2022:4818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-2/","reference_id":"USN-5022-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-2/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/","reference_id":"VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-880/","reference_id":"ZDI-21-880","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-880/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2389"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7j-a4nn-97f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79953?format=json","vulnerability_id":"VCID-qzc8-kgrw-7yg2","summary":"mysql: Server: DML unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35537","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35145","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35241","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35007","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35373","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35327","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3529","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35267","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35305","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35537"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016092","reference_id":"2016092","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016092"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35537"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzc8-kgrw-7yg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71987?format=json","vulnerability_id":"VCID-r1wz-evg7-2qf2","summary":"mysql: MySQL Server: Denial of Service vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21494.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21494","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06582","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06675","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06676","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06589","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21494"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339277","reference_id":"2339277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339277"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:46:29Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21494"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r1wz-evg7-2qf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74829?format=json","vulnerability_id":"VCID-r2p7-zrdf-bfhv","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21166.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21166","reference_id":"","reference_type":"","scores":[{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57982","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57961","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58002","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58006","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58005","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298344","reference_id":"2298344","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298344"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:59:45Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21166"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r2p7-zrdf-bfhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78265?format=json","vulnerability_id":"VCID-r33z-et19-mfa8","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21950.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21950.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21950","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38391","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38742","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38662","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3848","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38769","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38781","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38745","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38763","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21950"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224209","reference_id":"2224209","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224209"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:36Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21950"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r33z-et19-mfa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70387?format=json","vulnerability_id":"VCID-r3px-gk42-zuf7","summary":"mysql: DML unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21580.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21580.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21580","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21580"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359928","reference_id":"2359928","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359928"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T20:29:21Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21580"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3px-gk42-zuf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71967?format=json","vulnerability_id":"VCID-r44p-bdf5-quay","summary":"mysql: MySQL Server: Denial of service vulnerability allows high privileged attacker to crash the server via network.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21536.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21536.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21536","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24425","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21536"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339266","reference_id":"2339266","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339266"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:25:51Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21536"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r44p-bdf5-quay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79984?format=json","vulnerability_id":"VCID-r4jk-v7qa-nkf9","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35639","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34671","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34887","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3444","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34784","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34547","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34914","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34835","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34845","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35639"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016128","reference_id":"2016128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016128"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35639"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r4jk-v7qa-nkf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80403?format=json","vulnerability_id":"VCID-r4wz-4cet-p3ch","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2213","reference_id":"","reference_type":"","scores":[{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70736","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70887","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70879","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70889","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70769","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70828","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70797","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70842","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2213"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951771","reference_id":"1951771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951771"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2213"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r4wz-4cet-p3ch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/217725?format=json","vulnerability_id":"VCID-r5fp-cz89-k3gn","summary":"Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Trade Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Trade Management accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14876","reference_id":"","reference_type":"","scores":[{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83846","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.8372","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83809","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83842","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83707","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83761","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83783","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83777","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83773","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02024","scoring_system":"epss","scoring_elements":"0.83808","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14876"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-20-1283/","reference_id":"ZDI-20-1283","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:58:20Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-20-1283/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14876"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r5fp-cz89-k3gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78928?format=json","vulnerability_id":"VCID-r61x-fj13-v3b5","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21604.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21604","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21604"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142865","reference_id":"2142865","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142865"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21604"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r61x-fj13-v3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57033?format=json","vulnerability_id":"VCID-r6xq-en8s-u3db","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14852","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14852"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890771","reference_id":"1890771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890771"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:22Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14852"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r6xq-en8s-u3db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70385?format=json","vulnerability_id":"VCID-r7r7-41ez-cqhh","summary":"mysql: DDL unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21584.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21584.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21584","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21584"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359964","reference_id":"2359964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359964"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T19:48:18Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21584"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7r7-41ez-cqhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77817?format=json","vulnerability_id":"VCID-r7r8-ucgm-judb","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20961","reference_id":"","reference_type":"","scores":[{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64621","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64604","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6459","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6456","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64518","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64592","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20961"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258772","reference_id":"2258772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258772"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:53:34Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20961"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7r8-ucgm-judb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68650?format=json","vulnerability_id":"VCID-raqk-fgcd-jfa8","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50083.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50083","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29295","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31028","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31244","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31215","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31188","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50083"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380320","reference_id":"2380320","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380320"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-18T14:41:03Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50083"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-raqk-fgcd-jfa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71985?format=json","vulnerability_id":"VCID-rbtn-j7bg-8ydf","summary":"mysql: Denial of Service Vulnerability in Oracle MySQL Server Privilege Management","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21493.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21493.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21493","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.277","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27559","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27606","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27484","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27444","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21493"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339214","reference_id":"2339214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339214"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:49:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21493"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rbtn-j7bg-8ydf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68656?format=json","vulnerability_id":"VCID-rduw-2g78-97e1","summary":"mysql: DML unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50078.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50078.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50078","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29295","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31028","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31244","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31215","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31188","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50078"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380280","reference_id":"2380280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380280"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:23:44Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50078"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rduw-2g78-97e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57133?format=json","vulnerability_id":"VCID-rf1r-a5xx-akb3","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2022","reference_id":"","reference_type":"","scores":[{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.64986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65128","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65088","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65107","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65096","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65068","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65105","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65114","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65098","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65116","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65064","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65025","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922389","reference_id":"1922389","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922389"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2022"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78015?format=json","vulnerability_id":"VCID-rhas-tp6e-hqde","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22095.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22095.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22095","reference_id":"","reference_type":"","scores":[{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31881","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31795","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31828","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31784","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31762","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31562","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31434","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31349","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22095"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245025","reference_id":"2245025","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245025"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22095"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rhas-tp6e-hqde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71976?format=json","vulnerability_id":"VCID-rhj1-htvj-1qcs","summary":"mysql: MySQL Server: Denial of Service vulnerability via network access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21519.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21519","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.2725","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27431","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27326","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27731","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27637","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27535","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27544","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27516","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27477","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21519"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339281","reference_id":"2339281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339281"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:37:23Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21519"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rhj1-htvj-1qcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79961?format=json","vulnerability_id":"VCID-rhr1-hje4-2qe6","summary":"mysql: Server: Options unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35602","reference_id":"","reference_type":"","scores":[{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45062","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45007","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45107","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.4516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45201","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45194","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45066","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45165","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35602"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016100","reference_id":"2016100","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016100"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35602"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rhr1-hje4-2qe6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79787?format=json","vulnerability_id":"VCID-rjhp-4nxn-zya4","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21342","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48243","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21342"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043635","reference_id":"2043635","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043635"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21342"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rjhp-4nxn-zya4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71977?format=json","vulnerability_id":"VCID-rmjq-hppb-1qa4","summary":"mysql: Optimizer unspecified vulnerability (CPU Jan 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21518.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21518.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21518","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3823","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38211","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38144","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21518"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339293","reference_id":"2339293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339293"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:38:47Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21518"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmjq-hppb-1qa4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78753?format=json","vulnerability_id":"VCID-rna4-zqrp-77fr","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21880.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21880.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21880","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26926","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26646","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2677","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26749","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26711","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21880"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162287","reference_id":"2162287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21880"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rna4-zqrp-77fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68630?format=json","vulnerability_id":"VCID-rpad-uaey-jkg2","summary":"mysql: DDL unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50104.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50104","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25573","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25498","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27361","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27437","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27742","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27699","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27641","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27625","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27587","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50104"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380309","reference_id":"2380309","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380309"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:05:58Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50104"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rpad-uaey-jkg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79491?format=json","vulnerability_id":"VCID-rqm1-abez-ska4","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21412","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082636","reference_id":"2082636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082636"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21412"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rqm1-abez-ska4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70368?format=json","vulnerability_id":"VCID-rqvf-dgy8-qudx","summary":"mysql: PS unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30705.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30705","reference_id":"","reference_type":"","scores":[{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54291","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54332","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54341","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54355","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54296","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54343","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54374","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54353","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54377","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30705"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359932","reference_id":"2359932","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359932"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:09:00Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30705"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rqvf-dgy8-qudx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80399?format=json","vulnerability_id":"VCID-rr3t-1zsh-b7hm","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2203","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951768","reference_id":"1951768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951768"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2203"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rr3t-1zsh-b7hm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78268?format=json","vulnerability_id":"VCID-rt2r-64y1-8yhg","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22008.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22008","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13528","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13751","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13713","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13663","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13645","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13656","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1365","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22008"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224213","reference_id":"2224213","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224213"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22008"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rt2r-64y1-8yhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79796?format=json","vulnerability_id":"VCID-ruz5-9rez-77gq","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21370","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39325","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39716","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21370"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043644","reference_id":"2043644","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043644"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21370"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ruz5-9rez-77gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78011?format=json","vulnerability_id":"VCID-rxn5-5rba-fkhd","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22078.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22078.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22078","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07639","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07595","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.076","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08375","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22078"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245021","reference_id":"2245021","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245021"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-05T16:23:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22078"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rxn5-5rba-fkhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79508?format=json","vulnerability_id":"VCID-s1cy-v2fk-kua7","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21454","reference_id":"","reference_type":"","scores":[{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.6057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60653","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60669","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60655","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60617","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60621","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21454"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082653","reference_id":"2082653","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082653"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21454"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s1cy-v2fk-kua7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70369?format=json","vulnerability_id":"VCID-s1x1-jz8c-wyb8","summary":"mysql: Components Services unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30704.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30704.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30704","reference_id":"","reference_type":"","scores":[{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46314","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46283","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46336","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46362","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46333","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.464","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46397","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46343","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30704"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359943","reference_id":"2359943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359943"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:10:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30704"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s1x1-jz8c-wyb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70390?format=json","vulnerability_id":"VCID-s21f-qt4w-x7h3","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21577.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21577.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21577","reference_id":"","reference_type":"","scores":[{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49669","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.4966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49694","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49647","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49732","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49704","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21577"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359920","reference_id":"2359920","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359920"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21577"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s21f-qt4w-x7h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76848?format=json","vulnerability_id":"VCID-s28q-3n1p-wuex","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20998.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20998","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27486","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27676","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35619","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35547","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35582","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35537","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35543","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20998"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275430","reference_id":"2275430","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275430"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T15:50:40Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-19T15:50:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20998"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s28q-3n1p-wuex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74820?format=json","vulnerability_id":"VCID-s5s8-w5bn-ekha","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21135.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21135","reference_id":"","reference_type":"","scores":[{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49258","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.4926","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49287","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.4924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49294","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49291","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49288","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49332","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21135"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298319","reference_id":"2298319","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298319"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:57:24Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21135"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s5s8-w5bn-ekha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78933?format=json","vulnerability_id":"VCID-s77u-5edq-tkec","summary":"mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21617.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21617","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25724","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25918","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21617"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142870","reference_id":"2142870","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142870"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"},{"reference_url":"https://usn.ubuntu.com/5696-2/","reference_id":"USN-5696-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21617"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s77u-5edq-tkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64967?format=json","vulnerability_id":"VCID-sawk-emag-1ygs","summary":"mysql: Optimizer unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21968.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21968.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21968","reference_id":"","reference_type":"","scores":[{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20245","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20285","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20634","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20424","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20414","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21968"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115","reference_id":"1126115","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431409","reference_id":"2431409","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431409"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T19:20:23Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0136","reference_id":"RHSA-2026:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0247","reference_id":"RHSA-2026:0247","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0247"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0334","reference_id":"RHSA-2026:0334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0335","reference_id":"RHSA-2026:0335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0376","reference_id":"RHSA-2026:0376","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0376"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4162","reference_id":"RHSA-2026:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4828","reference_id":"RHSA-2026:4828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5580","reference_id":"RHSA-2026:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5640","reference_id":"RHSA-2026:5640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6391","reference_id":"RHSA-2026:6391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6435","reference_id":"RHSA-2026:6435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6435"},{"reference_url":"https://usn.ubuntu.com/7994-1/","reference_id":"USN-7994-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7994-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21968"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sawk-emag-1ygs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66836?format=json","vulnerability_id":"VCID-sb7s-h4k3-gubc","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53062.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53062.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53062","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14342","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53062"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543","reference_id":"1118543","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405511","reference_id":"2405511","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405511"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T14:30:07Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23008","reference_id":"RHSA-2025:23008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23109","reference_id":"RHSA-2025:23109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23111","reference_id":"RHSA-2025:23111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23134","reference_id":"RHSA-2025:23134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23137","reference_id":"RHSA-2025:23137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23137"},{"reference_url":"https://usn.ubuntu.com/7873-1/","reference_id":"USN-7873-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7873-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931427?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.44-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.44-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53062"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sb7s-h4k3-gubc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78937?format=json","vulnerability_id":"VCID-sc1z-ry96-duc7","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21635","reference_id":"","reference_type":"","scores":[{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.7182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.7193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71899","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71932","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71862","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71868","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71894","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21635"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142874","reference_id":"2142874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142874"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21635"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sc1z-ry96-duc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79511?format=json","vulnerability_id":"VCID-sg3r-6972-uyfz","summary":"mysql: Server: Logging unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21460","reference_id":"","reference_type":"","scores":[{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57074","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57049","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57126","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57099","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57127","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57139","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57118","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21460"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082656","reference_id":"2082656","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082656"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21460"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sg3r-6972-uyfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80157?format=json","vulnerability_id":"VCID-sguy-dt9t-ybgk","summary":"mysql: Server: Locking unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2402","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2402"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992312","reference_id":"1992312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2402"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sguy-dt9t-ybgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77819?format=json","vulnerability_id":"VCID-sm6e-jgke-g7cb","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20963","reference_id":"","reference_type":"","scores":[{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60775","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60768","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60817","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60833","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60822","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60864","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20963"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258774","reference_id":"2258774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258774"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20963"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sm6e-jgke-g7cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57143?format=json","vulnerability_id":"VCID-sq21-9e5z-muhb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json","reference_id":"","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2042","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28039","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2756","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27885","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28081","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27983","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27944","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2042"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922397","reference_id":"1922397","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922397"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2042"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sq21-9e5z-muhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57048?format=json","vulnerability_id":"VCID-sruz-agx3-3feq","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14878","reference_id":"","reference_type":"","scores":[{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75569","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75707","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75652","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75696","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75581","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75615","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.7565","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14878"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890780","reference_id":"1890780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890780"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:53:51Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14878"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sruz-agx3-3feq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80417?format=json","vulnerability_id":"VCID-suhd-prx3-k7fy","summary":"mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2301","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54796","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5492","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54895","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5491","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54903","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54917","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2301"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951782","reference_id":"1951782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951782"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2301"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-suhd-prx3-k7fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79972?format=json","vulnerability_id":"VCID-svv4-xj5y-5uad","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35627","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35627"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016113","reference_id":"2016113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016113"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:22Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35627"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-svv4-xj5y-5uad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57046?format=json","vulnerability_id":"VCID-swdu-cgp2-77e4","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14870","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14870"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890778","reference_id":"1890778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890778"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:07Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14870"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-swdu-cgp2-77e4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79959?format=json","vulnerability_id":"VCID-syty-vyfp-yygc","summary":"mysql: Server: Error Handling unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35596","reference_id":"","reference_type":"","scores":[{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.53998","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54016","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54056","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54019","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5407","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54117","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54099","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54082","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54125","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54072","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54083","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54042","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35596"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016098","reference_id":"2016098","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016098"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35596"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-syty-vyfp-yygc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57002?format=json","vulnerability_id":"VCID-t31g-7742-fqhk","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14786","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14786"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890746","reference_id":"1890746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890746"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14786"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t31g-7742-fqhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79794?format=json","vulnerability_id":"VCID-t6dn-wg6k-1ue6","summary":"mysql: Server: Compiling unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21367","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39325","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39716","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043642","reference_id":"2043642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043642"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"},{"reference_url":"https://usn.ubuntu.com/5270-2/","reference_id":"USN-5270-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21367"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t6dn-wg6k-1ue6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79951?format=json","vulnerability_id":"VCID-t6rb-2f2t-h7g3","summary":"mysql: Server: DML unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2479","reference_id":"","reference_type":"","scores":[{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67326","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67415","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67439","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67451","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.6746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67385","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2479"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016090","reference_id":"2016090","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016090"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2479"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t6rb-2f2t-h7g3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76868?format=json","vulnerability_id":"VCID-t9nz-hqgj-akfs","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21087.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21087.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21087","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25249","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25296","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2557","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25411","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25459","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25471","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25375","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21087"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275451","reference_id":"2275451","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275451"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:47:04Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:47:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21087"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t9nz-hqgj-akfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79963?format=json","vulnerability_id":"VCID-tatx-17xb-1qe1","summary":"mysql: Server: DML unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35607","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52745","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52813","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52825","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52862","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52821","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52831","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52795","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52762","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35607"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016104","reference_id":"2016104","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016104"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/","reference_id":"5MLAXYFLUDC636S46X34USCLDZAOFBM2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/","reference_id":"PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/","reference_id":"XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35607"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tatx-17xb-1qe1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79506?format=json","vulnerability_id":"VCID-tawp-6a7d-fycz","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21451","reference_id":"","reference_type":"","scores":[{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46355","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46242","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46293","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46359","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082651","reference_id":"2082651","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082651"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1007","reference_id":"RHSA-2022:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1010","reference_id":"RHSA-2022:1010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1556","reference_id":"RHSA-2022:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1557","reference_id":"RHSA-2022:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4818","reference_id":"RHSA-2022:4818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21451"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tawp-6a7d-fycz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80142?format=json","vulnerability_id":"VCID-tb6v-1rdb-m3hv","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2352","reference_id":"","reference_type":"","scores":[{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41408","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41142","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41442","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.4141","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41439","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41228","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41436","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41413","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2352"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992297","reference_id":"1992297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992297"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2352"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tb6v-1rdb-m3hv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80165?format=json","vulnerability_id":"VCID-tbfj-dfqj-6ff1","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2425","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2425"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992319","reference_id":"1992319","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2425"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tbfj-dfqj-6ff1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57157?format=json","vulnerability_id":"VCID-td7w-db1k-t3g3","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2072","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2072"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922406","reference_id":"1922406","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922406"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2072"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-td7w-db1k-t3g3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80398?format=json","vulnerability_id":"VCID-tdsp-tezp-2qhy","summary":"mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2202","reference_id":"","reference_type":"","scores":[{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81144","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81271","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81235","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81237","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81265","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81166","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81194","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81219","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81205","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81198","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2202"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951767","reference_id":"1951767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951767"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2202"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tdsp-tezp-2qhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57154?format=json","vulnerability_id":"VCID-teu1-w449-fkcx","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2065","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2065"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922404","reference_id":"1922404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922404"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2065"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-teu1-w449-fkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76863?format=json","vulnerability_id":"VCID-tn1d-ppx8-23ea","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21057","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30113","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30193","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30653","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30511","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3057","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30605","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30488","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21057"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275446","reference_id":"2275446","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275446"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T16:11:19Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21057"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tn1d-ppx8-23ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76857?format=json","vulnerability_id":"VCID-trty-bd23-6yej","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21051.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21051","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32856","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3282","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32671","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32878","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21051"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275439","reference_id":"2275439","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275439"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:56:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0012/","reference_id":"ntap-20240426-0012","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:56:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21051"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-trty-bd23-6yej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77825?format=json","vulnerability_id":"VCID-ttph-u92a-z3cx","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20969","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32431","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32814","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32629","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3278","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32827","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32819","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32837","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20969"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258780","reference_id":"2258780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258780"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T19:54:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20969"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ttph-u92a-z3cx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57134?format=json","vulnerability_id":"VCID-tudj-guxj-53ea","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2024","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70564","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70505","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70504","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2024"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922390","reference_id":"1922390","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922390"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2024"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tudj-guxj-53ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79225?format=json","vulnerability_id":"VCID-tupa-3adt-33hf","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21539","reference_id":"","reference_type":"","scores":[{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60437","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63975","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64003","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64034","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64046","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21539"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115297","reference_id":"2115297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21539"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tupa-3adt-33hf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57050?format=json","vulnerability_id":"VCID-tv36-3tsk-uket","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14891","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14891"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890782","reference_id":"1890782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890782"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:53Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14891"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tv36-3tsk-uket"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77823?format=json","vulnerability_id":"VCID-tv8p-rmhf-1ucm","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20967","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19138","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19284","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19192","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19181","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19565","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19413","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19313","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19275","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20967"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258778","reference_id":"2258778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258778"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20967"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tv8p-rmhf-1ucm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79971?format=json","vulnerability_id":"VCID-twrq-tvwe-xkd1","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35626","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54844","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54863","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54822","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35626"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016112","reference_id":"2016112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016112"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35626"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-twrq-tvwe-xkd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79494?format=json","vulnerability_id":"VCID-txsg-dega-4fcs","summary":"mysql: Server: Replication unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21415","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45358","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21415"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082639","reference_id":"2082639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082639"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21415"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txsg-dega-4fcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66841?format=json","vulnerability_id":"VCID-u1aw-uhmv-47am","summary":"mysql: Optimizer unspecified vulnerability (CPU Oct 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53042.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53042","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14342","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53042"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543","reference_id":"1118543","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405544","reference_id":"2405544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405544"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T16:07:19Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23008","reference_id":"RHSA-2025:23008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23109","reference_id":"RHSA-2025:23109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23111","reference_id":"RHSA-2025:23111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23134","reference_id":"RHSA-2025:23134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23137","reference_id":"RHSA-2025:23137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23137"},{"reference_url":"https://usn.ubuntu.com/7873-1/","reference_id":"USN-7873-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7873-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931427?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.44-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.44-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53042"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1aw-uhmv-47am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79224?format=json","vulnerability_id":"VCID-u26p-pxhd-6fhm","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21538","reference_id":"","reference_type":"","scores":[{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50197","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50203","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57686","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21538"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115296","reference_id":"2115296","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21538"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u26p-pxhd-6fhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77832?format=json","vulnerability_id":"VCID-u2pn-bks7-syhq","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20976","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44238","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44325","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20976"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258787","reference_id":"2258787","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20976"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u2pn-bks7-syhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70382?format=json","vulnerability_id":"VCID-u3t5-dpjc-hfde","summary":"mysql: DML unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21588.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21588.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21588","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21588"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359911","reference_id":"2359911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359911"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:31:42Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21588"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u3t5-dpjc-hfde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71972?format=json","vulnerability_id":"VCID-u7eb-cjgg-d7f1","summary":"mysql: Parser unspecified vulnerability (CPU Jan 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21522.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21522","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3823","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38211","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38144","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21522"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339284","reference_id":"2339284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339284"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:33:39Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21522"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u7eb-cjgg-d7f1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79992?format=json","vulnerability_id":"VCID-u8m3-6w1s-gyca","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35647","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54844","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54863","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54822","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35647"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016137","reference_id":"2016137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016137"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35647"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u8m3-6w1s-gyca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77836?format=json","vulnerability_id":"VCID-ucd7-7329-7qdm","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20982","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40141","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40235","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40223","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40428","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40439","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4046","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4045","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40419","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40344","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20982"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258791","reference_id":"2258791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20982"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucd7-7329-7qdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68643?format=json","vulnerability_id":"VCID-udg3-843v-2qbq","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50091.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50091.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50091","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50091"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380283","reference_id":"2380283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380283"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T13:48:41Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50091"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-udg3-843v-2qbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79789?format=json","vulnerability_id":"VCID-uh48-944q-zbdx","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21348","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48243","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21348"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043637","reference_id":"2043637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043637"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21348"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uh48-944q-zbdx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79212?format=json","vulnerability_id":"VCID-ujcd-zae5-fkc3","summary":"mysql: Server: Options unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21515","reference_id":"","reference_type":"","scores":[{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57503","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5748","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73102","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73053","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73139","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73096","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73085","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73122","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21515"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115284","reference_id":"2115284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115284"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://usn.ubuntu.com/5537-2/","reference_id":"USN-5537-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21515"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ujcd-zae5-fkc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68639?format=json","vulnerability_id":"VCID-ujn3-twtc-1yhr","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50096.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50096","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07106","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07021","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07138","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07077","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07052","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08095","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08108","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08091","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07981","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08139","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50096"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380334","reference_id":"2380334","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380334"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:12:15Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50096"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ujn3-twtc-1yhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79774?format=json","vulnerability_id":"VCID-ukyc-ycpk-6ff1","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21253","reference_id":"","reference_type":"","scores":[{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5819","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5826","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58237","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58227","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58204","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58238","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21253"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043622","reference_id":"2043622","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043622"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21253"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ukyc-ycpk-6ff1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79211?format=json","vulnerability_id":"VCID-umkj-5zap-zkgk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21509","reference_id":"","reference_type":"","scores":[{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4461","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4465","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44707","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49135","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49178","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21509"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115283","reference_id":"2115283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21509"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-umkj-5zap-zkgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80390?format=json","vulnerability_id":"VCID-unnc-t1ky-c3fx","summary":"mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2178","reference_id":"","reference_type":"","scores":[{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80267","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.8018","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80212","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80213","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80152","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2178"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951760","reference_id":"1951760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951760"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2178"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unnc-t1ky-c3fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71960?format=json","vulnerability_id":"VCID-ur4k-96w9-j3ae","summary":"mysql: Privilege Handling Flaw in MySQL Server","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21567.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21567.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21567","reference_id":"","reference_type":"","scores":[{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46401","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46461","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46442","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46402","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46458","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46452","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46462","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46516","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21567"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339222","reference_id":"2339222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339222"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T14:41:30Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21567"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ur4k-96w9-j3ae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80405?format=json","vulnerability_id":"VCID-usjz-e1at-vubb","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2217","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951773","reference_id":"1951773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2217"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-usjz-e1at-vubb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71986?format=json","vulnerability_id":"VCID-uyvy-pyuw-wug6","summary":"mysql: MySQL Server: Denial of Service via network access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21492.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21492","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1961","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19828","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19782","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19702","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19715","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339244","reference_id":"2339244","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339244"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T19:13:03Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21492"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uyvy-pyuw-wug6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57159?format=json","vulnerability_id":"VCID-uzvh-tvvx-vyer","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2081","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2081"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922416","reference_id":"1922416","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922416"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2081"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uzvh-tvvx-vyer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76853?format=json","vulnerability_id":"VCID-v13a-j6tv-bfd1","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21015.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21015","reference_id":"","reference_type":"","scores":[{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33662","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33773","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.3375","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36176","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36091","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36109","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36077","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36051","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21015"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275435","reference_id":"2275435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275435"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.34_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-15T15:58:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0010/","reference_id":"ntap-20240426-0010","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-15T15:58:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0010/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21015"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v13a-j6tv-bfd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74822?format=json","vulnerability_id":"VCID-v4nw-zcp6-sfhc","summary":"mysql: Privileges unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21142.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21142.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21142","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40406","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40432","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40407","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40419","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40429","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40399","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40323","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21142"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298324","reference_id":"2298324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298324"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T19:09:47Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21142"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v4nw-zcp6-sfhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77837?format=json","vulnerability_id":"VCID-v6r4-jmvd-1fg4","summary":"mysql: Server: DML unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20983.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20983","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34448","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34793","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34535","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34877","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34815","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34853","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20983"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258792","reference_id":"2258792","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258792"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0009/","reference_id":"ntap-20240201-0009","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:42:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20983"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6r4-jmvd-1fg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74817?format=json","vulnerability_id":"VCID-v7xv-var1-6uf8","summary":"mysql: DDL unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21129.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21129","reference_id":"","reference_type":"","scores":[{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43049","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43128","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43222","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43235","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43258","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43193","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21129"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298314","reference_id":"2298314","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298314"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:33:07Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21129"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v7xv-var1-6uf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73619?format=json","vulnerability_id":"VCID-v938-xjj2-1ub8","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21236.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21236.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21236","reference_id":"","reference_type":"","scores":[{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39167","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39264","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39556","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.3958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.3955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39566","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39576","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39538","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39571","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39458","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21236"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318883","reference_id":"2318883","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318883"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21236"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v938-xjj2-1ub8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78922?format=json","vulnerability_id":"VCID-v9fn-83g5-cka5","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21589.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21589.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21589","reference_id":"","reference_type":"","scores":[{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39777","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39874","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39859","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42277","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42328","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42336","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42358","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42322","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42294","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.4232","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21589"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142859","reference_id":"2142859","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142859"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2484","reference_id":"RHSA-2019:2484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2511","reference_id":"RHSA-2019:2511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2511"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"},{"reference_url":"https://usn.ubuntu.com/5696-2/","reference_id":"USN-5696-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21589"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v9fn-83g5-cka5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71970?format=json","vulnerability_id":"VCID-vakq-qnu4-3kgy","summary":"mysql: MySQL Server: Denial of service vulnerability via network access","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21529.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21529","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24409","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24425","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21529"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339226","reference_id":"2339226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339226"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:09:49Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21529"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vakq-qnu4-3kgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57006?format=json","vulnerability_id":"VCID-vap7-ycjn-73d1","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14793","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74749","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74785","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74793","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74827","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14793"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890750","reference_id":"1890750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890750"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14793"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vap7-ycjn-73d1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57122?format=json","vulnerability_id":"VCID-vcyx-58nm-gbba","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2007","reference_id":"","reference_type":"","scores":[{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67187","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67319","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67276","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67289","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67296","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.6726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67308","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67287","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67318","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67248","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67225","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2007"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922382","reference_id":"1922382","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922382"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210622-0001/","reference_id":"ntap-20210622-0001","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210622-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3708","reference_id":"RHSA-2019:3708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1100","reference_id":"RHSA-2020:1100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5503","reference_id":"RHSA-2020:5503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5655","reference_id":"RHSA-2020:5655","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5660","reference_id":"RHSA-2020:5660","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5662","reference_id":"RHSA-2020:5662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2007"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vcyx-58nm-gbba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80419?format=json","vulnerability_id":"VCID-vfxa-abgu-9ydp","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2305","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951784","reference_id":"1951784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951784"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2305"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vfxa-abgu-9ydp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70378?format=json","vulnerability_id":"VCID-vh1d-rrss-1ued","summary":"mysql: Replication unspecified vulnerability (CPU Apr 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30685.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30685.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30685","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5485","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54896","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30685"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385","reference_id":"1103385","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359940","reference_id":"2359940","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359940"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2025.html","reference_id":"cpuapr2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:29:03Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7479-1/","reference_id":"USN-7479-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7479-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-30685"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vh1d-rrss-1ued"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68644?format=json","vulnerability_id":"VCID-vh2y-epxw-pkfk","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50089.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50089.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50089","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27639","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27531","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27849","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27807","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27756","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27691","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50089"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380271","reference_id":"2380271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380271"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T13:50:58Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50089"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vh2y-epxw-pkfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71983?format=json","vulnerability_id":"VCID-vhqr-1w8g-syfs","summary":"mysql: Optimizer unspecified vulnerability (CPU Jan 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21500.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21500","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.37947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38216","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3823","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38211","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38144","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21500"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877","reference_id":"1093877","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339300","reference_id":"2339300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339300"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:33:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7245-1/","reference_id":"USN-7245-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7245-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931424?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.41-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.41-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21500"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vhqr-1w8g-syfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74815?format=json","vulnerability_id":"VCID-vjyr-1v5e-nqb2","summary":"mysql: FTS unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21125.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21125.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21125","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33894","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33779","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33778","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21125"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298310","reference_id":"2298310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298310"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:18:35Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21125"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjyr-1v5e-nqb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68646?format=json","vulnerability_id":"VCID-vn46-17pe-1bdv","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50088.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50088","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50088"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380313","reference_id":"2380313","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380313"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T13:52:13Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931425?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.42-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.42-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50088"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vn46-17pe-1bdv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71982?format=json","vulnerability_id":"VCID-vpsk-1cf7-k3d1","summary":"mysql: DDL unspecified vulnerability (CPU Jan 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21499.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21499.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21499","reference_id":"","reference_type":"","scores":[{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27221","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.277","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27559","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27606","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27484","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27444","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21499"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339285","reference_id":"2339285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339285"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:41:33Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21499"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vpsk-1cf7-k3d1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74835?format=json","vulnerability_id":"VCID-vpxt-xv8s-2fec","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21185.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21185","reference_id":"","reference_type":"","scores":[{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76436","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76416","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76423","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76295","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76351","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.7635","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76391","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76397","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76382","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21185"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298362","reference_id":"2298362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298362"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T19:02:51Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931422?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.39-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.39-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21185"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vpxt-xv8s-2fec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73654?format=json","vulnerability_id":"VCID-vqnk-47mg-dycs","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21199.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21199.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21199","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36889","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36662","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.37048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.37081","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36972","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43049","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21199"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318922","reference_id":"2318922","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318922"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21199"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqnk-47mg-dycs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68634?format=json","vulnerability_id":"VCID-vrwb-1uce-nbhk","summary":"mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50100.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50100.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50100","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20836","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22416","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22716","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22676","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22619","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22632","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22584","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50100"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380322","reference_id":"2380322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380322"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:04:15Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50100"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vrwb-1uce-nbhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80139?format=json","vulnerability_id":"VCID-vsrs-874z-7qh7","summary":"mysql: Server: Memcached unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2340","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35984","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35491","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35898","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35609","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36013","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35917","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992279","reference_id":"1992279","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992279"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2340"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vsrs-874z-7qh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80161?format=json","vulnerability_id":"VCID-vucs-k62a-xke9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2418","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992316","reference_id":"1992316","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2418"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vucs-k62a-xke9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78502?format=json","vulnerability_id":"VCID-vwms-568k-gfe1","summary":"mysql: Client programs unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21980.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21980.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21980","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59091","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5912","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59135","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59115","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59134","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59133","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21980"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188131","reference_id":"2188131","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188131"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-16T14:25:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"},{"reference_url":"https://usn.ubuntu.com/6060-2/","reference_id":"USN-6060-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21980"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwms-568k-gfe1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78941?format=json","vulnerability_id":"VCID-vyqe-sag1-c3gm","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21641","reference_id":"","reference_type":"","scores":[{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63958","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63966","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63913","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142878","reference_id":"2142878","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142878"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21641"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vyqe-sag1-c3gm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79510?format=json","vulnerability_id":"VCID-w1m7-xnmp-cyet","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21459","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51005","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5111","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51066","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21459"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082655","reference_id":"2082655","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082655"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21459"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w1m7-xnmp-cyet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78738?format=json","vulnerability_id":"VCID-w32w-gync-fyf3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21865.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21865.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21865","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26578","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21865"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162272","reference_id":"2162272","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162272"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21865"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w32w-gync-fyf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68654?format=json","vulnerability_id":"VCID-w7ss-7r6k-afce","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50079.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50079","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50079"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380274","reference_id":"2380274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380274"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:21:38Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50079"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w7ss-7r6k-afce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78270?format=json","vulnerability_id":"VCID-w89v-ws3n-6bgj","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22038.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22038.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22038","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10987","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10802","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11003","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11007","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10975","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10816","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10901","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10859","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22038"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819","reference_id":"1041819","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224215","reference_id":"2224215","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224215"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2023.html","reference_id":"cpujul2023.html","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2023.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6288-1/","reference_id":"USN-6288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22038"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w89v-ws3n-6bgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80141?format=json","vulnerability_id":"VCID-w8gu-h6z8-wkcx","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2342","reference_id":"","reference_type":"","scores":[{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63197","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2342"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992294","reference_id":"1992294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992294"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2342"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w8gu-h6z8-wkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57124?format=json","vulnerability_id":"VCID-w93s-7t77-x3fg","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2010","reference_id":"","reference_type":"","scores":[{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58449","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58505","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.5845","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58463","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58432","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2010"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922383","reference_id":"1922383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922383"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210622-0001/","reference_id":"ntap-20210622-0001","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210622-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2010"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w93s-7t77-x3fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78938?format=json","vulnerability_id":"VCID-w9e8-gnnz-rugf","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21637.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21637","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21637"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142875","reference_id":"2142875","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142875"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21637"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w9e8-gnnz-rugf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78482?format=json","vulnerability_id":"VCID-wcd1-xgsy-rkfx","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21912.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21912.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21912","reference_id":"","reference_type":"","scores":[{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.351","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3549","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35438","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35203","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35447","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35493","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35483","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35501","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21912"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188110","reference_id":"2188110","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188110"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"},{"reference_url":"https://usn.ubuntu.com/6060-2/","reference_id":"USN-6060-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21912"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wcd1-xgsy-rkfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78750?format=json","vulnerability_id":"VCID-wg76-asva-3qce","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21877.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21877","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32671","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3235","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32706","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32602","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32565","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32538","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3252","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21877"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162284","reference_id":"2162284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21877"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wg76-asva-3qce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64972?format=json","vulnerability_id":"VCID-wghs-nw4d-nfa3","summary":"mysql: Optimizer unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21949.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21949.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21949","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16422","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16466","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16531","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16539","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431434","reference_id":"2431434","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431434"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:13:19Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21949"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wghs-nw4d-nfa3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79792?format=json","vulnerability_id":"VCID-wkz5-36y5-k7f7","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21358","reference_id":"","reference_type":"","scores":[{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51142","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51067","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51075","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51038","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51095","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51135","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51114","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51136","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21358"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043640","reference_id":"2043640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043640"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:14Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21358"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wkz5-36y5-k7f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79788?format=json","vulnerability_id":"VCID-wm2n-ww3b-qkfp","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21344","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39325","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39716","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21344"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043636","reference_id":"2043636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043636"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"},{"reference_url":"https://usn.ubuntu.com/5270-2/","reference_id":"USN-5270-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21344"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wm2n-ww3b-qkfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73630?format=json","vulnerability_id":"VCID-wqv6-96cm-f3ec","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21218.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21218","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33469","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33448","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33978","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33863","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33861","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39149","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21218"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318876","reference_id":"2318876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318876"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21218"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqv6-96cm-f3ec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78925?format=json","vulnerability_id":"VCID-wt5d-srfd-3qhc","summary":"mysql: C API unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21595","reference_id":"","reference_type":"","scores":[{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33625","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34117","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33734","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33711","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34155","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34141","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21595"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142862","reference_id":"2142862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142862"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5759","reference_id":"RHSA-2022:5759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5826","reference_id":"RHSA-2022:5826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5948","reference_id":"RHSA-2022:5948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6306","reference_id":"RHSA-2022:6306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6443","reference_id":"RHSA-2022:6443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21595"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wt5d-srfd-3qhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78756?format=json","vulnerability_id":"VCID-wuf9-tbh8-ffat","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21883.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21883","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2667","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26336","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26398","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26712","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26566","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26615","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26518","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2646","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21883"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162290","reference_id":"2162290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162290"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21883"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wuf9-tbh8-ffat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78923?format=json","vulnerability_id":"VCID-wuuw-gec8-7fh2","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21592","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61176","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61198","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61168","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61192","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21592"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142860","reference_id":"2142860","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142860"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"},{"reference_url":"https://usn.ubuntu.com/5696-2/","reference_id":"USN-5696-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21592"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wuuw-gec8-7fh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77820?format=json","vulnerability_id":"VCID-wvmj-yphj-2ybt","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20964","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55448","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55454","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55549","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55552","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20964"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258775","reference_id":"2258775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20964"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvmj-yphj-2ybt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57164?format=json","vulnerability_id":"VCID-wvxn-ugew-u7bj","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2166","reference_id":"","reference_type":"","scores":[{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78602","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78516","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78522","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78547","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78529","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78549","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78548","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78585","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951755","reference_id":"1951755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951755"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428","reference_id":"988428","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://security.archlinux.org/ASA-202105-14","reference_id":"ASA-202105-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-14"},{"reference_url":"https://security.archlinux.org/AVG-1882","reference_id":"AVG-1882","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1882"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/","reference_id":"DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/","reference_id":"GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.gentoo.org/glsa/202105-28","reference_id":"GLSA-202105-28","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://security.gentoo.org/glsa/202105-28"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/","reference_id":"PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1007","reference_id":"RHSA-2022:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1010","reference_id":"RHSA-2022:1010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1556","reference_id":"RHSA-2022:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1557","reference_id":"RHSA-2022:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4818","reference_id":"RHSA-2022:4818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2166"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79993?format=json","vulnerability_id":"VCID-x1ya-zfn1-ebdd","summary":"mysql: Server: FTS unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35648","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54844","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54863","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54845","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54822","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35648"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016138","reference_id":"2016138","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016138"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35648"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ya-zfn1-ebdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68653?format=json","vulnerability_id":"VCID-x34f-j5pb-skf1","summary":"mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50080.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50080","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50080"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380312","reference_id":"2380312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380312"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:19:20Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50080"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x34f-j5pb-skf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77835?format=json","vulnerability_id":"VCID-x695-8ykr-cffs","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20981","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36902","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37296","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37243","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37317","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37329","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37267","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37314","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20981"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258790","reference_id":"2258790","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258790"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:56:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20981"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x695-8ykr-cffs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68633?format=json","vulnerability_id":"VCID-x744-yd5b-d7h9","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50101.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50101.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50101","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50101"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380284","reference_id":"2380284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380284"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:04:09Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50101"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x744-yd5b-d7h9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79228?format=json","vulnerability_id":"VCID-x9ts-bdrn-ufha","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21556","reference_id":"","reference_type":"","scores":[{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55431","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55514","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59439","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59456","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59472","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59493","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21556"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115300","reference_id":"2115300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21556"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x9ts-bdrn-ufha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80422?format=json","vulnerability_id":"VCID-xjhs-6sgc-nfhu","summary":"mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2308","reference_id":"","reference_type":"","scores":[{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35439","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35586","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35537","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35277","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35663","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3559","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35579","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35596","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2308"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951786","reference_id":"1951786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951786"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2308"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjhs-6sgc-nfhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64964?format=json","vulnerability_id":"VCID-xp7r-kvy5-a3hh","summary":"mysql: Optimizer unspecified vulnerability (CPU Jan 2026)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21948.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21948.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21948","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14977","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-21948"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115","reference_id":"1126115","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126115"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431385","reference_id":"2431385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431385"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2026.html","reference_id":"cpujan2026.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:10:23Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2026.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4162","reference_id":"RHSA-2026:4162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4828","reference_id":"RHSA-2026:4828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5580","reference_id":"RHSA-2026:5580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5640","reference_id":"RHSA-2026:5640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6391","reference_id":"RHSA-2026:6391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6391"},{"reference_url":"https://usn.ubuntu.com/7994-1/","reference_id":"USN-7994-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7994-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2026-21948"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xp7r-kvy5-a3hh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77831?format=json","vulnerability_id":"VCID-xqxx-emaq-8ubs","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20975.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20975","reference_id":"","reference_type":"","scores":[{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44572","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53885","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53883","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.5393","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53866","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53833","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20975"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258786","reference_id":"2258786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258786"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0007/","reference_id":"ntap-20240201-0007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:06:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0007/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20975"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqxx-emaq-8ubs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78499?format=json","vulnerability_id":"VCID-xs7y-us9k-kycg","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21972.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21972.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21972","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12985","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12987","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12883","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21972"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188128","reference_id":"2188128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188128"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21972"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xs7y-us9k-kycg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68655?format=json","vulnerability_id":"VCID-xvwt-4g7s-r3d6","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50077.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50077","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27784","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29411","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29669","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50077"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372","reference_id":"1109372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109372"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380278","reference_id":"2380278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380278"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:25:38Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15699","reference_id":"RHSA-2025:15699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16046","reference_id":"RHSA-2025:16046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16086","reference_id":"RHSA-2025:16086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16861","reference_id":"RHSA-2025:16861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16861"},{"reference_url":"https://usn.ubuntu.com/7691-1/","reference_id":"USN-7691-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-1/"},{"reference_url":"https://usn.ubuntu.com/7691-2/","reference_id":"USN-7691-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7691-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931426?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.43-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.43-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50077"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xvwt-4g7s-r3d6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78022?format=json","vulnerability_id":"VCID-xwtb-h96c-kydx","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22113.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22113.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22113","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06684","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06712","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06702","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06862","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0687","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06891","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06727","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06762","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06781","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07569","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22113"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245032","reference_id":"2245032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245032"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T15:06:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931417?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.34-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.34-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22113"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwtb-h96c-kydx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/278831?format=json","vulnerability_id":"VCID-xxqx-v9mb-audf","summary":"Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: Core Client). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. While the vulnerability is in MySQL Shell, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Shell accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39402","reference_id":"","reference_type":"","scores":[{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48631","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48681","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48655","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48683","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48671","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48732","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48728","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00254","scoring_system":"epss","scoring_elements":"0.48686","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39402"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-39402"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xxqx-v9mb-audf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80424?format=json","vulnerability_id":"VCID-xztv-b4hb-tkgv","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2160.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2160.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2160","reference_id":"","reference_type":"","scores":[{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47627","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47632","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47752","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47745","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47697","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47678","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47686","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47635","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4769","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47687","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47696","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2160"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1952806","reference_id":"1952806","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1952806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2160"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xztv-b4hb-tkgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57130?format=json","vulnerability_id":"VCID-xzx5-52qt-ffcj","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2019.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2019.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2019","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51398","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51441","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51483","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.515","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51478","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51437","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51431","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2019"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922386","reference_id":"1922386","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922386"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2019"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xzx5-52qt-ffcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74832?format=json","vulnerability_id":"VCID-y26k-v7p2-s7cs","summary":"mysql: Thread Pooling unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21176.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21176","reference_id":"","reference_type":"","scores":[{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73556","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73547","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73559","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.7345","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73459","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73473","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73477","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.7352","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00767","scoring_system":"epss","scoring_elements":"0.73514","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21176"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298353","reference_id":"2298353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298353"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:24:12Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21176"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y26k-v7p2-s7cs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73617?format=json","vulnerability_id":"VCID-y2g3-7eyv-buba","summary":"mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21238.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21238.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21238","reference_id":"","reference_type":"","scores":[{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.5137","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51318","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51325","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.5128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51332","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.5134","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.5139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62112","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21238"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318857","reference_id":"2318857","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318857"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21238"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y2g3-7eyv-buba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80402?format=json","vulnerability_id":"VCID-y3a3-tp5x-nqch","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2212","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951770","reference_id":"1951770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951770"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2212"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y3a3-tp5x-nqch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79777?format=json","vulnerability_id":"VCID-y3ue-d94d-vygc","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21264","reference_id":"","reference_type":"","scores":[{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59796","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59789","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59778","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59762","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21264"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043625","reference_id":"2043625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043625"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21264"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y3ue-d94d-vygc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73650?format=json","vulnerability_id":"VCID-y4ku-kd73-h3fe","summary":"mysql: Optimizer unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21200.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21200.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21200","reference_id":"","reference_type":"","scores":[{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36679","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37216","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37047","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37087","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37106","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37031","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21200"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318875","reference_id":"2318875","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318875"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21200"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y4ku-kd73-h3fe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80172?format=json","vulnerability_id":"VCID-y5nf-6qad-13er","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2444","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34671","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34887","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3444","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34784","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34547","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34914","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34835","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34845","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992326","reference_id":"1992326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2444"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y5nf-6qad-13er"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79215?format=json","vulnerability_id":"VCID-y6n1-n99c-yfcu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21525","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41591","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59779","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21525"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115287","reference_id":"2115287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115287"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21525"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y6n1-n99c-yfcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66835?format=json","vulnerability_id":"VCID-y6qb-579e-qbdk","summary":"mysql: Optimizer unspecified vulnerability (CPU Oct 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53067.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53067.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53067","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14342","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53067"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405521","reference_id":"2405521","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405521"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T19:45:40Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53067"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y6qb-579e-qbdk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74828?format=json","vulnerability_id":"VCID-y8rv-fy8z-aqa3","summary":"mysql: Pluggable Auth unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21165.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21165.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21165","reference_id":"","reference_type":"","scores":[{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43049","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43128","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.4317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43222","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43235","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43258","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43193","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21165"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298343","reference_id":"2298343","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298343"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:22:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21165"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y8rv-fy8z-aqa3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78014?format=json","vulnerability_id":"VCID-yd9z-3fwe-vfba","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22092.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22092.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22092","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22121","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22092"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034","reference_id":"1055034","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055034"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245024","reference_id":"2245024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6459-1/","reference_id":"USN-6459-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6459-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931418?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.35-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.35-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22092"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yd9z-3fwe-vfba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74825?format=json","vulnerability_id":"VCID-yejv-zbnn-pyd2","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21160.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21160.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21160","reference_id":"","reference_type":"","scores":[{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49258","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.493","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.4926","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49287","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.4924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49294","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49291","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49288","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49332","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21160"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298338","reference_id":"2298338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298338"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:32:07Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21160"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yejv-zbnn-pyd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57049?format=json","vulnerability_id":"VCID-yf77-atgx-dyh3","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14888","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14888"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890781","reference_id":"1890781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890781"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:56Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14888"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yf77-atgx-dyh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74816?format=json","vulnerability_id":"VCID-yfyy-8jn9-tqhj","summary":"mysql: DDL unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21127.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21127","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40406","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40432","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40407","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40419","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40429","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40399","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40323","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21127"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298312","reference_id":"2298312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298312"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T17:29:00Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://usn.ubuntu.com/6934-1/","reference_id":"USN-6934-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6934-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931421?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.38-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.38-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21127"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yfyy-8jn9-tqhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79502?format=json","vulnerability_id":"VCID-yn56-p3gf-13gf","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21437","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45358","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21437"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082647","reference_id":"2082647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082647"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21437"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yn56-p3gf-13gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80160?format=json","vulnerability_id":"VCID-yr11-2geq-k7aa","summary":"mysql: Server: GIS unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2417","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25718","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2579","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2562","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25592","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25543","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25535","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25602","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25721","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25734","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25635","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25636","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992315","reference_id":"1992315","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2417"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yr11-2geq-k7aa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78003?format=json","vulnerability_id":"VCID-yur8-xgu4-pqbc","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22028.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22028","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30064","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29919","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31426","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33089","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245013","reference_id":"2245013","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6583-1/","reference_id":"USN-6583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6583-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22028"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yur8-xgu4-pqbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80159?format=json","vulnerability_id":"VCID-yvkw-q3bp-73d6","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2412","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992314","reference_id":"1992314","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992314"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2412"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yvkw-q3bp-73d6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79970?format=json","vulnerability_id":"VCID-yvvh-5fmy-hkau","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35625","reference_id":"","reference_type":"","scores":[{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29144","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29483","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29437","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29209","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29589","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2951","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35625"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016111","reference_id":"2016111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016111"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5123-1/","reference_id":"USN-5123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-35625"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yvvh-5fmy-hkau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71978?format=json","vulnerability_id":"VCID-ywr6-pt9c-tkb5","summary":"mysql: MySQL Server: Optimizer Denial of Service Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21504.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-21504.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21504","reference_id":"","reference_type":"","scores":[{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52087","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.5209","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.5212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52127","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52114","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52131","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52162","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.5219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52173","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21504"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339236","reference_id":"2339236","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339236"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2025.html","reference_id":"cpujan2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T16:24:28Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-21504"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ywr6-pt9c-tkb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73605?format=json","vulnerability_id":"VCID-yxvn-sna2-zbbd","summary":"mysql: mysqldump unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21247.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21247.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21247","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39322","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39421","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39691","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39679","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39662","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39713","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39684","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.396","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21247"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318926","reference_id":"2318926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318926"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_client:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_client:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21247"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yxvn-sna2-zbbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78485?format=json","vulnerability_id":"VCID-z4a8-r35u-kqdn","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21919.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21919.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21919","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21919"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188113","reference_id":"2188113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188113"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21919"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z4a8-r35u-kqdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57121?format=json","vulnerability_id":"VCID-z56k-yk6c-hudp","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2006.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2006.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2006","reference_id":"","reference_type":"","scores":[{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78127","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.7818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78189","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78215","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.7821","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01115","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2006"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922381","reference_id":"1922381","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922381"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210622-0001/","reference_id":"ntap-20210622-0001","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210622-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931410?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.21-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.21-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2006"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z56k-yk6c-hudp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57150?format=json","vulnerability_id":"VCID-z7zv-zgw7-n3fj","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2058","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2058"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922401","reference_id":"1922401","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922401"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931408?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.23-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.23-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2058"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z7zv-zgw7-n3fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78001?format=json","vulnerability_id":"VCID-zc2d-3ejk-g7b9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22015.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22015","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3405","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33938","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3398","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34011","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33968","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35454","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22015"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245011","reference_id":"2245011","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6288-2/","reference_id":"USN-6288-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22015"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zc2d-3ejk-g7b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79773?format=json","vulnerability_id":"VCID-zcn4-h4j5-qfat","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21249","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35984","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35491","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35898","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35609","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36013","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35917","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21249"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043621","reference_id":"2043621","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043621"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21249"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zcn4-h4j5-qfat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76854?format=json","vulnerability_id":"VCID-zcn5-6jqw-nkft","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21047.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21047.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21047","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36826","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.3717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36914","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47898","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47885","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47939","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47933","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21047"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275436","reference_id":"2275436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275436"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-15T18:26:30Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-15T18:26:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21047"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zcn5-6jqw-nkft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79782?format=json","vulnerability_id":"VCID-ze42-san9-aqdg","summary":"mysql: Server: DML unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21301","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51331","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51359","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51366","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51297","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51311","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51308","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21301"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043630","reference_id":"2043630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043630"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/","reference_id":"D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/","reference_id":"U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21301"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ze42-san9-aqdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73657?format=json","vulnerability_id":"VCID-zhvk-mwgs-f3hj","summary":"mysql: X Plugin unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21196.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21196","reference_id":"","reference_type":"","scores":[{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47269","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47328","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47313","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47322","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47344","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47325","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47383","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47377","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21196"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294","reference_id":"1085294","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085294"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318858","reference_id":"2318858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318858"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7102-1/","reference_id":"USN-7102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931423?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.40-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.40-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21196"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zhvk-mwgs-f3hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57123?format=json","vulnerability_id":"VCID-zjes-mkae-que3","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2009.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2009.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2009","reference_id":"","reference_type":"","scores":[{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42086","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42049","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42024","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42074","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41917","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41912","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42063","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42001","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2009"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922424","reference_id":"1922424","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922424"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3518","reference_id":"RHSA-2020:3518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3732","reference_id":"RHSA-2020:3732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3755","reference_id":"RHSA-2020:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3757","reference_id":"RHSA-2020:3757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3757"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2009"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zjes-mkae-que3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80408?format=json","vulnerability_id":"VCID-zkmv-3qu7-4kee","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2230","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2230"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951775","reference_id":"1951775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951775"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2021-2230"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zkmv-3qu7-4kee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57047?format=json","vulnerability_id":"VCID-zn55-b12v-5fax","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14873","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890779","reference_id":"1890779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890779"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:06Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931407?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2020-14873"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zn55-b12v-5fax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76870?format=json","vulnerability_id":"VCID-zqht-7ggw-jkav","summary":"mysql: Server: Thread Pooling unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21102.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21102","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.41954","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42096","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42036","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43302","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43268","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43269","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43289","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43241","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21102"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189","reference_id":"1069189","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069189"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275453","reference_id":"2275453","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275453"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.33_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.33_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.33_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.29_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.29_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.29_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_ndb_cluster:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_ndb_cluster:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_ndb_cluster:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.3.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T21:15:30Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0013/","reference_id":"ntap-20240426-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T21:15:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0013/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0015/","reference_id":"ntap-20240426-0015","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T21:15:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0015/"},{"reference_url":"https://usn.ubuntu.com/6823-1/","reference_id":"USN-6823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931420?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.37-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.37-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21102"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zqht-7ggw-jkav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73641?format=json","vulnerability_id":"VCID-zqje-g7pp-tua9","summary":"mysql: mysqldump unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21209.json","reference_id":"","reference_type":"","scores":[{"value":"2.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21209","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48177","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49252","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49261","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49219","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21209"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318898","reference_id":"2318898","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318898"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:8.4.2_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_client:8.4.2_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:8.4.2_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931409?format=json","purl":"pkg:deb/debian/mysql-8.0@0?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@0%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21209"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zqje-g7pp-tua9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78935?format=json","vulnerability_id":"VCID-zsw1-uqnv-ekfy","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21632.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21632","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142872","reference_id":"2142872","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142872"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931414?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.31-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.31-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21632"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zsw1-uqnv-ekfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68657?format=json","vulnerability_id":"VCID-zt2v-9ka8-g3ff","summary":"mysql: DML unspecified vulnerability (CPU Jul 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50076.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50076","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29295","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31028","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31244","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31215","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31188","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-50076"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380316","reference_id":"2380316","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380316"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2025.html","reference_id":"cpujul2025.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:26:39Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2025.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931411?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-50076"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zt2v-9ka8-g3ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66839?format=json","vulnerability_id":"VCID-zw22-e5hb-7ff1","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2025)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53044.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53044.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53044","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14347","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14342","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-53044"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543","reference_id":"1118543","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118543"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405491","reference_id":"2405491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2405491"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2025.html","reference_id":"cpuoct2025.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T16:08:58Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2025.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23008","reference_id":"RHSA-2025:23008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23109","reference_id":"RHSA-2025:23109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23111","reference_id":"RHSA-2025:23111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23134","reference_id":"RHSA-2025:23134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23137","reference_id":"RHSA-2025:23137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23137"},{"reference_url":"https://usn.ubuntu.com/7873-1/","reference_id":"USN-7873-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7873-1/"},{"reference_url":"https://usn.ubuntu.com/8006-1/","reference_id":"USN-8006-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8006-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931427?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.44-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.44-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2025-53044"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zw22-e5hb-7ff1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79799?format=json","vulnerability_id":"VCID-zxdt-rp17-ebbu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21378","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48243","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21378"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043647","reference_id":"2043647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2043647"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5270-1/","reference_id":"USN-5270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5270-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931412?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.29-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.29-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21378"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxdt-rp17-ebbu"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"}