Lookup for vulnerable packages by Package URL.

GET /api/packages/931407?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "mysql-8.0",
    "version": "8.0.22-1",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "8.0.23-1",
    "latest_non_vulnerable_version": "8.0.46-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56998?format=api",
            "vulnerability_id": "VCID-11tt-44je-dfg8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80644",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80652",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80841",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80708",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80724",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80711",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80703",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80737",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80738",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80741",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80764",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80768",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80781",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80798",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8082",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80674",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8067",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80698",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14775"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890784",
                    "reference_id": "1890784",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890784"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14775"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-11tt-44je-dfg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57023?format=api",
            "vulnerability_id": "VCID-187q-sxxu-zyh5",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14836",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7041",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70424",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7061",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70525",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70505",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70555",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70564",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70538",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70577",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70441",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70419",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70465",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7048",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70504",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70489",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70475",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70517",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14836"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890763",
                    "reference_id": "1890763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890763"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14836"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-187q-sxxu-zyh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57040?format=api",
            "vulnerability_id": "VCID-1vkz-z2pq-nbat",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14861"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890773",
                    "reference_id": "1890773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890773"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14861"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vkz-z2pq-nbat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57009?format=api",
            "vulnerability_id": "VCID-1vm5-s57q-5fh7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5534",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55452",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55468",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55498",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55422",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55442",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55415",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5541",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55476",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55454",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55506",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55507",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55516",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55495",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55479",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55515",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55519",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14800"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890753",
                    "reference_id": "1890753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890753"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14800"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vm5-s57q-5fh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57010?format=api",
            "vulnerability_id": "VCID-26c7-8j5m-pygt",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58885",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5896",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59057",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58989",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59023",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59027",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59005",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58991",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58951",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58982",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58948",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59006",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59026",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59007",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14804"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890754",
                    "reference_id": "1890754",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890754"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14804"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26c7-8j5m-pygt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57017?format=api",
            "vulnerability_id": "VCID-2sfw-7k8u-1fbk",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14827.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14827",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63748",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63809",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6395",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63872",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63878",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6389",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63888",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63859",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63903",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63835",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63793",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63844",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63861",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63875",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63827",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63863",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14827"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890759",
                    "reference_id": "1890759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890759"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14827"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2sfw-7k8u-1fbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57014?format=api",
            "vulnerability_id": "VCID-2ytu-hw3r-ffc8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42497",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42402",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42479",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14814"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890757",
                    "reference_id": "1890757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890757"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:00Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14814"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytu-hw3r-ffc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57051?format=api",
            "vulnerability_id": "VCID-2zv1-9c2g-fkdq",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52483",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5253",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52585",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52635",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52571",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52582",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52544",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52486",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5254",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52556",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52523",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52575",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52569",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5262",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52603",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52588",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52628",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14893"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890783",
                    "reference_id": "1890783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890783"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14893"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2zv1-9c2g-fkdq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57147?format=api",
            "vulnerability_id": "VCID-3k3d-296j-kycn",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2055"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922400",
                    "reference_id": "1922400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922400"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2055"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3k3d-296j-kycn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57003?format=api",
            "vulnerability_id": "VCID-4msq-13an-d7cb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76546",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76715",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76574",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76598",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76604",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76636",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7664",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76628",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7666",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76666",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76678",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76697",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14789"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747",
                    "reference_id": "1890747",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890747"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14789"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57042?format=api",
            "vulnerability_id": "VCID-4qvq-j6yh-ckbf",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14866",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14866"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890774",
                    "reference_id": "1890774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890774"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14866"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-j6yh-ckbf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56999?format=api",
            "vulnerability_id": "VCID-5sgr-q6mn-u7gq",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76541",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76546",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76715",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76574",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76598",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76604",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76636",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7664",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76628",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7666",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76666",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76678",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76697",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743",
                    "reference_id": "1890743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890743"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14776"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57004?format=api",
            "vulnerability_id": "VCID-5ug6-v7ru-j3bv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74705",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74889",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74756",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74779",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74749",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74785",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74793",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74783",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74819",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74827",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7483",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74835",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74864",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74735",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74741",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14790"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890748",
                    "reference_id": "1890748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890748"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14790"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ug6-v7ru-j3bv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57001?format=api",
            "vulnerability_id": "VCID-6grs-76qf-jqhf",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74596",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74532",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7454",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74539",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7457",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14785"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890745",
                    "reference_id": "1890745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890745"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14785"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6grs-76qf-jqhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57011?format=api",
            "vulnerability_id": "VCID-6w26-6psj-zubm",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14809"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890755",
                    "reference_id": "1890755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890755"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14809"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6w26-6psj-zubm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57018?format=api",
            "vulnerability_id": "VCID-6z2t-rt9t-wydy",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14828",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76404",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76309",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76345",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76353",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76365",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76354",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76383",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76254",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76234",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76266",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7628",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76306",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76284",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76279",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7632",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76325",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14828"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890760",
                    "reference_id": "1890760",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890760"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14828"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6z2t-rt9t-wydy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57032?format=api",
            "vulnerability_id": "VCID-71bd-rm5x-cud8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.568",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56736",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56754",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56738",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56692",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14848"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890770",
                    "reference_id": "1890770",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890770"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14848"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-71bd-rm5x-cud8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57024?format=api",
            "vulnerability_id": "VCID-7jj8-tenv-zub1",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42497",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42402",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42479",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14837"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890764",
                    "reference_id": "1890764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890764"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14837"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jj8-tenv-zub1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57045?format=api",
            "vulnerability_id": "VCID-9nry-61xw-cug4",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14869.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42497",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42402",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42479",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14869"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890777",
                    "reference_id": "1890777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890777"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14869"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9nry-61xw-cug4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57027?format=api",
            "vulnerability_id": "VCID-9ycb-mjma-7qfv",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42497",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42402",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42479",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14839"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890766",
                    "reference_id": "1890766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890766"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14839"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ycb-mjma-7qfv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57000?format=api",
            "vulnerability_id": "VCID-aaq9-6yhn-afbx",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14777",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74596",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74532",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7454",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74539",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7457",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14777"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890744",
                    "reference_id": "1890744",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890744"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14777"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aaq9-6yhn-afbx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57020?format=api",
            "vulnerability_id": "VCID-aczd-32sa-fffg",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14829"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890761",
                    "reference_id": "1890761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890761"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:49Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14829"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aczd-32sa-fffg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57137?format=api",
            "vulnerability_id": "VCID-c6rw-mujf-qqbj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2030"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922392",
                    "reference_id": "1922392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922392"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2030"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6rw-mujf-qqbj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57043?format=api",
            "vulnerability_id": "VCID-cr9r-v269-7qan",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42497",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42402",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42479",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14867"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890775",
                    "reference_id": "1890775",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890775"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14867"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr9r-v269-7qan"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56987?format=api",
            "vulnerability_id": "VCID-d5hc-4qz5-3uag",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77954",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77961",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78145",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78002",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78029",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78012",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78011",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78046",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78045",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78038",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78071",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78078",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78091",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78102",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78129",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7799",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77971",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77998",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14672"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890737",
                    "reference_id": "1890737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890737"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14672"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5hc-4qz5-3uag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57028?format=api",
            "vulnerability_id": "VCID-da5g-ea4u-qfeh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14844"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890767",
                    "reference_id": "1890767",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890767"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14844"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-da5g-ea4u-qfeh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57005?format=api",
            "vulnerability_id": "VCID-dcyd-xspe-q7eh",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62004",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62063",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62228",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62132",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62152",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62141",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6212",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62164",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6217",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62155",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62167",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62183",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62177",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62121",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62169",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62095",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62064",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00423",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62114",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14791"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890749",
                    "reference_id": "1890749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890749"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14791"
            ],
            "risk_score": 1.0,
            "exploitability": "0.5",
            "weighted_severity": "2.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyd-xspe-q7eh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56996?format=api",
            "vulnerability_id": "VCID-ert5-smsw-1ba2",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14771.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45237",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45319",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45162",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45327",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45238",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45244",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45185",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45081",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45145",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4534",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45339",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4536",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45329",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4533",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45381",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45377",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14771"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890740",
                    "reference_id": "1890740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890740"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14771"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ert5-smsw-1ba2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57136?format=api",
            "vulnerability_id": "VCID-gmxv-dxp3-cuhq",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2028"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922391",
                    "reference_id": "1922391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922391"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2028"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmxv-dxp3-cuhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57026?format=api",
            "vulnerability_id": "VCID-h2r2-p8v7-sfc6",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48171",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48188",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4824",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48221",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48233",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4818",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48098",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48162",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48228",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48179",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48235",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48229",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48254",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48239",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4829",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48285",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14838"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890765",
                    "reference_id": "1890765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890765"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14838"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2r2-p8v7-sfc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57008?format=api",
            "vulnerability_id": "VCID-hjkk-adkv-yfdu",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14799.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46097",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46137",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46074",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4616",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4614",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46149",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4609",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45993",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46057",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46158",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46105",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46161",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46182",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46153",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46162",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4622",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46216",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14799"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890752",
                    "reference_id": "1890752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890752"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3518",
                    "reference_id": "RHSA-2020:3518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3732",
                    "reference_id": "RHSA-2020:3732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3755",
                    "reference_id": "RHSA-2020:3755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3757",
                    "reference_id": "RHSA-2020:3757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3757"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14799"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkk-adkv-yfdu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56997?format=api",
            "vulnerability_id": "VCID-hrbc-2cpw-5be7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74596",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74532",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7454",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74539",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7457",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14773"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890742",
                    "reference_id": "1890742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890742"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14773"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hrbc-2cpw-5be7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57021?format=api",
            "vulnerability_id": "VCID-jate-mc8k-13gn",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70779",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70794",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7099",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7087",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70925",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70934",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70932",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70915",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70954",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70812",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70787",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70831",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70847",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70838",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70885",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70891",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14830"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890762",
                    "reference_id": "1890762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890762"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14830"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jate-mc8k-13gn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57031?format=api",
            "vulnerability_id": "VCID-k4fk-qkr8-1uac",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70779",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70794",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7099",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7087",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70925",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70934",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70932",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70915",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70954",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70812",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70787",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70831",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70847",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70838",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70885",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00651",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70891",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14846"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890769",
                    "reference_id": "1890769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890769"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14846"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4fk-qkr8-1uac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57015?format=api",
            "vulnerability_id": "VCID-ndhs-j4q8-zkf8",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14821"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890758",
                    "reference_id": "1890758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890758"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14821"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ndhs-j4q8-zkf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57030?format=api",
            "vulnerability_id": "VCID-njkb-a6xx-wke9",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42497",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42402",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42479",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14845"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890768",
                    "reference_id": "1890768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890768"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:31Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14845"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njkb-a6xx-wke9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57044?format=api",
            "vulnerability_id": "VCID-pawh-67dd-xbay",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56777",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.568",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56822",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56736",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56754",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56738",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56692",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56798",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56774",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56816",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56825",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14868"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890776",
                    "reference_id": "1890776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890776"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:10Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14868"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pawh-67dd-xbay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56995?format=api",
            "vulnerability_id": "VCID-pfkc-qtn3-skgp",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14769",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80644",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80652",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80841",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80708",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80724",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80711",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80703",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80737",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80738",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80741",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80764",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80768",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80781",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80798",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8082",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80674",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8067",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80698",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14769"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890739",
                    "reference_id": "1890739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890739"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14769"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pfkc-qtn3-skgp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56994?format=api",
            "vulnerability_id": "VCID-pmhc-1rhq-gfeb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82525",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82539",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82727",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82554",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8255",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82576",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82584",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82602",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82596",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82589",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82626",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82629",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8265",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82661",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82667",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82684",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01757",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82706",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14765"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738",
                    "reference_id": "1890738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890738"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14765"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57037?format=api",
            "vulnerability_id": "VCID-ptkb-y547-skg4",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40685",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40769",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40429",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40681",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40585",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40573",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4049",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40344",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40411",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40796",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40722",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40772",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40779",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40798",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40763",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40745",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40789",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40759",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14860"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890772",
                    "reference_id": "1890772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890772"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14860"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkb-y547-skg4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57012?format=api",
            "vulnerability_id": "VCID-qe1p-f4h5-uyga",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80331",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80338",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80523",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80347",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80376",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80386",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80405",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8039",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80412",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80413",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80417",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80442",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80449",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80466",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80481",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80504",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14812"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756",
                    "reference_id": "1890756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890756"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/",
                    "reference_id": "JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html",
                    "reference_id": "msg00027.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/",
                    "reference_id": "OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14812"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57007?format=api",
            "vulnerability_id": "VCID-qrcr-rtqs-f3g7",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74596",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74532",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7454",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74539",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7457",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14794"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890751",
                    "reference_id": "1890751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890751"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14794"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qrcr-rtqs-f3g7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/217725?format=api",
            "vulnerability_id": "VCID-r5fp-cz89-k3gn",
            "summary": "Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Trade Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Trade Management accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83906",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8372",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83846",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83869",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83889",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83707",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83734",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83737",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83761",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83767",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83783",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83777",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83773",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83807",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83808",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83809",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83833",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83842",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14876"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1283/",
                    "reference_id": "ZDI-20-1283",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:58:20Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1283/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14876"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r5fp-cz89-k3gn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57033?format=api",
            "vulnerability_id": "VCID-r6xq-en8s-u3db",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42497",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42702",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42543",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42402",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42479",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4274",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4268",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42731",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42776",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14852"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890771",
                    "reference_id": "1890771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890771"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14852"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r6xq-en8s-u3db"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57143?format=api",
            "vulnerability_id": "VCID-sq21-9e5z-muhb",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27967",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28039",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27472",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27832",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27748",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27637",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2756",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27389",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2745",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28081",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27876",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27942",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27983",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27986",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27944",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27885",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27894",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27875",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2042"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922397",
                    "reference_id": "1922397",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922397"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0003/",
                    "reference_id": "ntap-20210219-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210219-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2042"
            ],
            "risk_score": 1.1,
            "exploitability": "0.5",
            "weighted_severity": "2.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sq21-9e5z-muhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57048?format=api",
            "vulnerability_id": "VCID-sruz-agx3-3feq",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14878.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75569",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75571",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75765",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75652",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75691",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75696",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75707",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75711",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7574",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75601",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75581",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75615",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7565",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75632",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75663",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75667",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14878"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890780",
                    "reference_id": "1890780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890780"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:53:51Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14878"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sruz-agx3-3feq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57046?format=api",
            "vulnerability_id": "VCID-swdu-cgp2-77e4",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14870"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890778",
                    "reference_id": "1890778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890778"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14870"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-swdu-cgp2-77e4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57002?format=api",
            "vulnerability_id": "VCID-t31g-7742-fqhk",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74596",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74449",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74469",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74498",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74506",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74532",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7454",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74539",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7457",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74417",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14786"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890746",
                    "reference_id": "1890746",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890746"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14786"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t31g-7742-fqhk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57050?format=api",
            "vulnerability_id": "VCID-tv36-3tsk-uket",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14891"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890782",
                    "reference_id": "1890782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890782"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14891"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tv36-3tsk-uket"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57006?format=api",
            "vulnerability_id": "VCID-vap7-ycjn-73d1",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74705",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74889",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74756",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74779",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74749",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74785",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74793",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74783",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74819",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74827",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7483",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74835",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74864",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74735",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00843",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74741",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14793"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890750",
                    "reference_id": "1890750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890750"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/",
                    "reference_id": "GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/",
                    "reference_id": "O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/",
                    "reference_id": "ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14793"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vap7-ycjn-73d1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57049?format=api",
            "vulnerability_id": "VCID-yf77-atgx-dyh3",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14888",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14888"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890781",
                    "reference_id": "1890781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890781"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:56Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14888"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yf77-atgx-dyh3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57047?format=api",
            "vulnerability_id": "VCID-zn55-b12v-5fax",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42247",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42001",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42053",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41913",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41986",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42276",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42262",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4226",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14873"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890779",
                    "reference_id": "1890779",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890779"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623",
                    "reference_id": "972623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:06Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4604-1/",
                    "reference_id": "USN-4604-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4604-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931407?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.22-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2020-14873"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zn55-b12v-5fax"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.22-1%3Fdistro=sid"
}