Lookup for vulnerable packages by Package URL.

GET /api/packages/931411?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "mysql-8.0",
    "version": "8.0.28-1",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "8.0.29-1",
    "latest_non_vulnerable_version": "8.0.46-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79981?format=api",
            "vulnerability_id": "VCID-129c-q69g-nkbu",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63203",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63215",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63159",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35636"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016124",
                    "reference_id": "2016124",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016124"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:13Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35636"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-129c-q69g-nkbu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79973?format=api",
            "vulnerability_id": "VCID-1748-hmbg-hbhk",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63203",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63215",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63159",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35628"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016114",
                    "reference_id": "2016114",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016114"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:21Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35628"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1748-hmbg-hbhk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80385?format=api",
            "vulnerability_id": "VCID-1b6h-r8cr-7be7",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82369",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82383",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82635",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82479",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82483",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82505",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82515",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82519",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82539",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82559",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82579",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82578",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82594",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82397",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82425",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82432",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82451",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82447",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82442",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82477",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2169"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951756",
                    "reference_id": "1951756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951756"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2169"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6h-r8cr-7be7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80391?format=api",
            "vulnerability_id": "VCID-1muw-xrgz-uub8",
            "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2179",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82369",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82383",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82635",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82479",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82483",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82505",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82515",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82519",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82539",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82559",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82579",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82578",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82594",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82397",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82425",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82432",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82451",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82447",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82442",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82477",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2179"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951761",
                    "reference_id": "1951761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951761"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2179"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1muw-xrgz-uub8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79991?format=api",
            "vulnerability_id": "VCID-259b-q1uk-vyap",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5474",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54811",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54905",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.548",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54856",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54816",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54842",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54803",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54845",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54822",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5486",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54844",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54818",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54838",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54813",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54758",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35646"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016135",
                    "reference_id": "2016135",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016135"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:03Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35646"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-259b-q1uk-vyap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80381?format=api",
            "vulnerability_id": "VCID-2uvf-vapz-8ud5",
            "summary": "mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2162.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2162.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2162",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70164",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70176",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70408",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70332",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70363",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70331",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70358",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70193",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7017",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70217",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70232",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70255",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7024",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70227",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70269",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70278",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70258",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7031",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70318",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70316",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7029",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2162"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951753",
                    "reference_id": "1951753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951753"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2162"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2uvf-vapz-8ud5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79960?format=api",
            "vulnerability_id": "VCID-34tb-1r12-kbe9",
            "summary": "mysql: C API unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71378",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71386",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71626",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71472",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71452",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71503",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7151",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71514",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71502",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71537",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71573",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71539",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71569",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71404",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71379",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7142",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71432",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71454",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71438",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71421",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71467",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35597"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016099",
                    "reference_id": "2016099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016099"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0005/",
                    "reference_id": "ntap-20211022-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0005/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35597"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-34tb-1r12-kbe9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79976?format=api",
            "vulnerability_id": "VCID-35tu-zc9b-j7dd",
            "summary": "mysql: Server: GIS unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63203",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63215",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63159",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35631"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016118",
                    "reference_id": "2016118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016118"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:18Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35631"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35tu-zc9b-j7dd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79962?format=api",
            "vulnerability_id": "VCID-36fa-z98h-3yfk",
            "summary": "mysql: InnoDB unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42962",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43022",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42833",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42986",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43036",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43037",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4308",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43068",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43004",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42938",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42939",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42858",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42719",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42795",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42811",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42738",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42767",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00207",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43049",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101",
                    "reference_id": "2016101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/",
                    "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-2/",
                    "reference_id": "USN-5123-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5170-1/",
                    "reference_id": "USN-5170-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5170-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/",
                    "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35604"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97211?format=api",
            "vulnerability_id": "VCID-37kg-raqg-2ugz",
            "summary": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: ndbcluster/plugin DDL). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51505",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51406",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51438",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51398",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51426",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51356",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51433",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51446",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51444",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51487",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51465",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51453",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51495",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51503",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51481",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5144",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.514",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51344",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00281",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51394",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35584"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35584"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-37kg-raqg-2ugz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97212?format=api",
            "vulnerability_id": "VCID-3h8k-bmwq-4uam",
            "summary": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72844",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72621",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72801",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72765",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7279",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72613",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72616",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72654",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72667",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7269",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72673",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72663",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72705",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72708",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72749",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72758",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72754",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72747",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72776",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35613"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35613"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3h8k-bmwq-4uam"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79980?format=api",
            "vulnerability_id": "VCID-3kv6-pbgg-c3au",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63203",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63215",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63159",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35635"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016122",
                    "reference_id": "2016122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016122"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:14Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35635"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3kv6-pbgg-c3au"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79990?format=api",
            "vulnerability_id": "VCID-3qju-u4f8-6ybw",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35645",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63203",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63215",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63159",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35645"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016134",
                    "reference_id": "2016134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016134"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:04Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35645"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3qju-u4f8-6ybw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80397?format=api",
            "vulnerability_id": "VCID-4c8x-j238-bbgz",
            "summary": "mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76812",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77054",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76999",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77003",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7686",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76878",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76914",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76919",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76942",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7695",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76952",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2201"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951766",
                    "reference_id": "1951766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951766"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2201"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4c8x-j238-bbgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79968?format=api",
            "vulnerability_id": "VCID-4d3p-r6am-xucc",
            "summary": "mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29616",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29099",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2906",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29075",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28998",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29018",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29486",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29587",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29589",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29544",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2951",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29483",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29437",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29323",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29209",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29144",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35623"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016109",
                    "reference_id": "2016109",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016109"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:26Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35623"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4d3p-r6am-xucc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79983?format=api",
            "vulnerability_id": "VCID-4jnd-s39x-a3e5",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35638",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60637",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60711",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6089",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60786",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60843",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60805",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60831",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6074",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60706",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60755",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6077",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60794",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6078",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60761",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60804",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60809",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60781",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60795",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60787",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60738",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35638"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016127",
                    "reference_id": "2016127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016127"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:11Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35638"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jnd-s39x-a3e5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80415?format=api",
            "vulnerability_id": "VCID-4qkm-twqk-nud6",
            "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54194",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54214",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54356",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54247",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54303",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54262",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54289",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54245",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5422",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54272",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54268",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54299",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54278",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54322",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54302",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54265",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5428",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54255",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54205",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2300"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951781",
                    "reference_id": "1951781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951781"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2300"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qkm-twqk-nud6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79986?format=api",
            "vulnerability_id": "VCID-4wes-5yrc-wkcc",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63203",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63215",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63159",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35641"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016130",
                    "reference_id": "2016130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016130"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:08Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35641"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4wes-5yrc-wkcc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80387?format=api",
            "vulnerability_id": "VCID-4zyv-b7d8-t7ec",
            "summary": "mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2171",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76432",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76436",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76668",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76536",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76524",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76558",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76563",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76577",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76565",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76595",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76612",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.766",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76619",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76465",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76447",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76479",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76493",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76519",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76498",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76492",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76532",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2171"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951758",
                    "reference_id": "1951758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951758"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2171"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zyv-b7d8-t7ec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80409?format=api",
            "vulnerability_id": "VCID-537e-defy-1qgh",
            "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30159",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30195",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29723",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29681",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29695",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29623",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29644",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30244",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30063",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30162",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30119",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30069",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30083",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3006",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30015",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29945",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29829",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29762",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29618",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2232"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951776",
                    "reference_id": "1951776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951776"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2232"
            ],
            "risk_score": 0.8,
            "exploitability": "0.5",
            "weighted_severity": "1.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-537e-defy-1qgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79979?format=api",
            "vulnerability_id": "VCID-5hjv-8tfx-ckbx",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63203",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63215",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63159",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35634"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016121",
                    "reference_id": "2016121",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016121"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:15Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35634"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjv-8tfx-ckbx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78927?format=api",
            "vulnerability_id": "VCID-69yx-qkan-d7d4",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79768",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79999",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7993",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79946",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79942",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7996",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79789",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79775",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79804",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79812",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79834",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79818",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7981",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79838",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79839",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79842",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79871",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79878",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79894",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79908",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21600"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142864",
                    "reference_id": "2142864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142864"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/",
                    "reference_id": "ntap-20221028-0013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T15:25:23Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221028-0013/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-21600"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69yx-qkan-d7d4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80412?format=api",
            "vulnerability_id": "VCID-6dtf-9d7c-buep",
            "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2293",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76812",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77054",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76999",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77003",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7686",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76878",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76914",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76919",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76942",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7695",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76952",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2293"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951778",
                    "reference_id": "1951778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951778"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2293"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dtf-9d7c-buep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/253338?format=api",
            "vulnerability_id": "VCID-6kqv-c42t-jqbj",
            "summary": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97339",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97274",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97312",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97316",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9732",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97326",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9733",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97269",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97279",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9728",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97287",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97288",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97291",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97292",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.973",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97303",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97304",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97305",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97308",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35594"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:51Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1227/",
                    "reference_id": "ZDI-21-1227",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:51Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1227/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35594"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kqv-c42t-jqbj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80386?format=api",
            "vulnerability_id": "VCID-77bs-kuvf-eua3",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2170",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79134",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7914",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79373",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79211",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79208",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79242",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79248",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79265",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79299",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79316",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79317",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79335",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79176",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79209",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79194",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79185",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2170"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951757",
                    "reference_id": "1951757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951757"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2170"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-77bs-kuvf-eua3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80407?format=api",
            "vulnerability_id": "VCID-7shp-crcm-vqfe",
            "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2226",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82386",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82401",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82652",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82576",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82596",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82595",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82611",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82419",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82415",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82443",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82449",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82468",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82463",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82459",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82494",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82495",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82499",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82522",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82532",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82536",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01732",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82556",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2226"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951774",
                    "reference_id": "1951774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951774"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2226"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7shp-crcm-vqfe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79975?format=api",
            "vulnerability_id": "VCID-8m18-147e-4ka4",
            "summary": "mysql: Server: Options unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6157",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61644",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61826",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61677",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61787",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61743",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61772",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61674",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61645",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61694",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61709",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61731",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61719",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61699",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6174",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61746",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61729",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61723",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61739",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61732",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35630"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016117",
                    "reference_id": "2016117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016117"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:19Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35630"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8m18-147e-4ka4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80404?format=api",
            "vulnerability_id": "VCID-8xpx-1fpf-m3fa",
            "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2215",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76812",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77054",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76999",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77003",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7686",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76878",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76914",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76919",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76942",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7695",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76952",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2215"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951772",
                    "reference_id": "1951772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951772"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2215"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8xpx-1fpf-m3fa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80394?format=api",
            "vulnerability_id": "VCID-9dt5-yek1-wfg9",
            "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78612",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78619",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78851",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78687",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78684",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78715",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78722",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78739",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78759",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78782",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78798",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78795",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78812",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78649",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7863",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78656",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78663",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78688",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78669",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78661",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7869",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951764",
                    "reference_id": "1951764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951764"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5246",
                    "reference_id": "RHSA-2020:5246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5500",
                    "reference_id": "RHSA-2020:5500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5654",
                    "reference_id": "RHSA-2020:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5663",
                    "reference_id": "RHSA-2020:5663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5665",
                    "reference_id": "RHSA-2020:5665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2194"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9dt5-yek1-wfg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79965?format=api",
            "vulnerability_id": "VCID-ac7j-w1pc-z3h2",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73167",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73177",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73394",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73264",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73273",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73265",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.733",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73313",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73311",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73305",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73331",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73354",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73337",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73197",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73172",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73208",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73222",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73247",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73228",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73221",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35610"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016106",
                    "reference_id": "2016106",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016106"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35610"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ac7j-w1pc-z3h2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79988?format=api",
            "vulnerability_id": "VCID-afgm-qfjk-77h2",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5474",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54811",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54905",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.548",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54856",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54816",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54842",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54803",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54845",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54822",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5486",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54844",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54818",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54838",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54813",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54758",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35643"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016132",
                    "reference_id": "2016132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016132"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:06Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35643"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-afgm-qfjk-77h2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79982?format=api",
            "vulnerability_id": "VCID-bbzn-prse-7fhm",
            "summary": "mysql: Server: PS unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44157",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44222",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44044",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43991",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44009",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43947",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43976",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44245",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44179",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4423",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44234",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44251",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44218",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44219",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44278",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44268",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44196",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44118",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44122",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44038",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43915",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016126",
                    "reference_id": "2016126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016126"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35637"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bbzn-prse-7fhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79987?format=api",
            "vulnerability_id": "VCID-bcv2-xfb3-4ker",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35642",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5474",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54811",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54905",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.548",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54856",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54816",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54842",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54803",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54845",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54822",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5486",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54844",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54818",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54838",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54813",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54758",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35642"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016131",
                    "reference_id": "2016131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016131"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:07Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35642"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bcv2-xfb3-4ker"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/253336?format=api",
            "vulnerability_id": "VCID-bu6s-4qt6-nkfz",
            "summary": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97339",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97274",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97312",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97316",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9732",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97326",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9733",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97269",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97279",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9728",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97287",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97288",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97291",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97292",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.973",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97303",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97304",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97305",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97308",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35593"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:53Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1229/",
                    "reference_id": "ZDI-21-1229",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:53Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1229/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35593"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bu6s-4qt6-nkfz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79958?format=api",
            "vulnerability_id": "VCID-byru-kqru-gfe6",
            "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59899",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59977",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60145",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60071",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60056",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60027",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60044",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60032",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59992",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60039",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60096",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60055",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60083",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60002",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60023",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60036",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60057",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60042",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60025",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60064",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35591"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016097",
                    "reference_id": "2016097",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016097"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35591"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byru-kqru-gfe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/253334?format=api",
            "vulnerability_id": "VCID-c95m-82hu-1qbg",
            "summary": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96584",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96513",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9656",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96562",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96568",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9657",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96575",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96504",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96517",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96521",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96529",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96531",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96534",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96537",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96543",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96549",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96551",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.28625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96552",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35592"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1228/",
                    "reference_id": "ZDI-21-1228",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:54Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1228/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35592"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c95m-82hu-1qbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80410?format=api",
            "vulnerability_id": "VCID-dv9f-cgsn-skgf",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76812",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77054",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76999",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77003",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7686",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76878",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76914",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76919",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76942",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7695",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76952",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2278"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951777",
                    "reference_id": "1951777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951777"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2278"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dv9f-cgsn-skgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80400?format=api",
            "vulnerability_id": "VCID-e7y6-8acx-tuh8",
            "summary": "mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8019",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80197",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80434",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80364",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80381",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80376",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80393",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80217",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80206",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80234",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80244",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80263",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80248",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80242",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80272",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80274",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80277",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80303",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80309",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80327",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80342",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2208"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951769",
                    "reference_id": "1951769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951769"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2208"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7y6-8acx-tuh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/253332?format=api",
            "vulnerability_id": "VCID-efvc-pezb-yuhw",
            "summary": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96528",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96537",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96558",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9656",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96567",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96572",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96575",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96576",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96577",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96579",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96586",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96588",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96542",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96545",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.28894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96555",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.46904",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97698",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.46904",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97693",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.46904",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97692",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.46904",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97705",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35590"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:55Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1226/",
                    "reference_id": "ZDI-21-1226",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:55Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1226/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35590"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-efvc-pezb-yuhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80413?format=api",
            "vulnerability_id": "VCID-fvuq-5szu-akfn",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2298",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81284",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81293",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81531",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81456",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81477",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81473",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81491",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81315",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81314",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81343",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81348",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81368",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81354",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81346",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81384",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81386",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81409",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81416",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8142",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81436",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2298"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951779",
                    "reference_id": "1951779",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951779"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2298"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fvuq-5szu-akfn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80420?format=api",
            "vulnerability_id": "VCID-g1py-km6y-uka8",
            "summary": "mysql: Server: Packaging unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63453",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63513",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63705",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63609",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63662",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63627",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63653",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6354",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63504",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63573",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63589",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63574",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63567",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63586",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.636",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63594",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00448",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63566",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2307"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951785",
                    "reference_id": "1951785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951785"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2307"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g1py-km6y-uka8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80382?format=api",
            "vulnerability_id": "VCID-gb4c-ypuu-gfgq",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79134",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7914",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79373",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79211",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79208",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79242",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79248",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79265",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79299",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79316",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79317",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79335",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79176",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79209",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79194",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79185",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2164"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951754",
                    "reference_id": "1951754",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951754"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2164"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gb4c-ypuu-gfgq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79977?format=api",
            "vulnerability_id": "VCID-gk57-6tsn-4yhs",
            "summary": "mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3087",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30999",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30435",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30414",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30421",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30345",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30368",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31047",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30865",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30923",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30953",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30956",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30914",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30869",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.309",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3088",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30846",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30567",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30483",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30342",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35632"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016119",
                    "reference_id": "2016119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016119"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35632"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gk57-6tsn-4yhs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79985?format=api",
            "vulnerability_id": "VCID-hhep-s9mq-6kbb",
            "summary": "mysql: Server: DDL unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30468",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30027",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29993",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30002",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29932",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29954",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30542",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30353",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30413",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30448",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30449",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30406",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30357",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30374",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30356",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30312",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30251",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30136",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30059",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29921",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35640"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016129",
                    "reference_id": "2016129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016129"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35640"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hhep-s9mq-6kbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79974?format=api",
            "vulnerability_id": "VCID-hsue-93wh-mygh",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3879",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39189",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39281",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39266",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39213",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.392",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48207",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4818",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48191",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48243",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48238",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48194",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48176",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48186",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48133",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48128",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48185",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48135",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48188",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48164",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35629"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016116",
                    "reference_id": "2016116",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016116"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35629"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hsue-93wh-mygh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79966?format=api",
            "vulnerability_id": "VCID-hwf4-mqxw-4ycq",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59261",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59335",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59495",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5938",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59438",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59397",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59423",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59324",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59375",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59388",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59407",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59391",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59373",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59405",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59412",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59393",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5937",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5939",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59374",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59332",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35612"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016107",
                    "reference_id": "2016107",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016107"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:31Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35612"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hwf4-mqxw-4ycq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79955?format=api",
            "vulnerability_id": "VCID-jkxq-q4u2-6fb6",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60158",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60234",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60396",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60321",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60328",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60314",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60285",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60301",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60289",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60245",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60351",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60308",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60336",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6026",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60228",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60277",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60292",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60313",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60299",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60281",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35575"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016094",
                    "reference_id": "2016094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016094"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35575"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jkxq-q4u2-6fb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80393?format=api",
            "vulnerability_id": "VCID-jntg-92ur-nbfa",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79134",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7914",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79373",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79211",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79208",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79242",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79248",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79265",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79299",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79316",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79317",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79335",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79176",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79209",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79194",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79185",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2193"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951763",
                    "reference_id": "1951763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951763"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2193"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jntg-92ur-nbfa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79969?format=api",
            "vulnerability_id": "VCID-k1mw-4auu-v7em",
            "summary": "mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53371",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53395",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5354",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53428",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53481",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53444",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53469",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53421",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5339",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53442",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53438",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53487",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5347",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53454",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53491",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53496",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53477",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53448",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53462",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53424",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00301",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53379",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35624"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016110",
                    "reference_id": "2016110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016110"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-2/",
                    "reference_id": "USN-5123-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35624"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k1mw-4auu-v7em"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79978?format=api",
            "vulnerability_id": "VCID-k37x-pg16-bqbb",
            "summary": "mysql: Server: Logging unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40135",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40286",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39891",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39859",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39878",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39798",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3982",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40311",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40233",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40285",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40297",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40309",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40272",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40252",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40299",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40268",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40017",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40003",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39921",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39793",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35633"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016120",
                    "reference_id": "2016120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016120"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35633"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k37x-pg16-bqbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80423?format=api",
            "vulnerability_id": "VCID-k3vn-aruy-nfan",
            "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76249",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76253",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76486",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76355",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76339",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76374",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76382",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76394",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76383",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76413",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76433",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76421",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76436",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76284",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76264",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76296",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76309",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76336",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76314",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7631",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7635",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2174"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952802",
                    "reference_id": "1952802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952802"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2174"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k3vn-aruy-nfan"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80389?format=api",
            "vulnerability_id": "VCID-kff6-5fr1-1khv",
            "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79972",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79979",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80207",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80052",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80053",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80081",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80086",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80101",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80116",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80137",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80153",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8015",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80165",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80001",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79991",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80019",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80028",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80048",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80031",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80024",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2172"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951759",
                    "reference_id": "1951759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951759"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2172"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kff6-5fr1-1khv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79989?format=api",
            "vulnerability_id": "VCID-kg95-ffr7-fkh8",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35644",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63203",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63215",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63159",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35644"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016133",
                    "reference_id": "2016133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016133"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:05Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35644"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kg95-ffr7-fkh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/253357?format=api",
            "vulnerability_id": "VCID-mjkd-v9e6-cbbt",
            "summary": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 1.8 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55398",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55327",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55295",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55312",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55338",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55228",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55351",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55333",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55383",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55384",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55394",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55373",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55354",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5539",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5531",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55331",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55304",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55252",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35618"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35618"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mjkd-v9e6-cbbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57165?format=api",
            "vulnerability_id": "VCID-muzn-dqpe-q7cr",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89091",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89099",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89242",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89134",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89139",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8915",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89146",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89157",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89171",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89176",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8918",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89188",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89205",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89216",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89213",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89222",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89113",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89116",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2180"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951762",
                    "reference_id": "1951762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951762"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-28",
                    "reference_id": "GLSA-202105-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-28"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2180"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-muzn-dqpe-q7cr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80379?format=api",
            "vulnerability_id": "VCID-njb2-z4kz-zybs",
            "summary": "mysql: Server: Options unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2146",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82369",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82383",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82635",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82479",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82483",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82505",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82515",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82519",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82539",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82559",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82579",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82578",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82594",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82397",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82425",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82432",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82451",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82447",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82442",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82477",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2146"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951751",
                    "reference_id": "1951751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951751"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2146"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njb2-z4kz-zybs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/253342?format=api",
            "vulnerability_id": "VCID-njee-wqeh-dyf1",
            "summary": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97339",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97274",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97312",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97316",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9732",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97326",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9733",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97269",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97279",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9728",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97287",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97288",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97291",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97292",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.973",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97303",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97304",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97305",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.39342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97308",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35598"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1230/",
                    "reference_id": "ZDI-21-1230",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:50Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1230/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35598"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njee-wqeh-dyf1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79952?format=api",
            "vulnerability_id": "VCID-nprc-6br4-gfdj",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7138",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71453",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71504",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71511",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71515",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71503",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71539",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71575",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71541",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71571",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71388",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71421",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71433",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71456",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7144",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71422",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71468",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71473",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2481"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016091",
                    "reference_id": "2016091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016091"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2481"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nprc-6br4-gfdj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80395?format=api",
            "vulnerability_id": "VCID-p559-ueva-ffgv",
            "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79134",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7914",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79373",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79211",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79208",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79242",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79248",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79265",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79278",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79299",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79316",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79317",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79335",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79176",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79209",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79194",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01233",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79185",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2196"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951765",
                    "reference_id": "1951765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951765"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2196"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p559-ueva-ffgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80414?format=api",
            "vulnerability_id": "VCID-p6g6-hqgv-vuce",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54194",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54214",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54356",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54247",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54303",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54262",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54289",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54245",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5422",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54272",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54268",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54299",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54278",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54322",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54302",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54265",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5428",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54255",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54205",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2299"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951780",
                    "reference_id": "1951780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951780"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2299"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p6g6-hqgv-vuce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/253362?format=api",
            "vulnerability_id": "VCID-pez6-qjvg-jke6",
            "summary": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90989",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90848",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90942",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90959",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90973",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9097",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90979",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90842",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90858",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90869",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9088",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90887",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90896",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90895",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9092",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90917",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90931",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90929",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06237",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90927",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35621"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:45Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1232/",
                    "reference_id": "ZDI-21-1232",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:24:45Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1232/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35621"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pez6-qjvg-jke6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79964?format=api",
            "vulnerability_id": "VCID-pq5z-fp69-sufy",
            "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57978",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58062",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58175",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5809",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58121",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58122",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58097",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58063",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58077",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58022",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58124",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58076",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58105",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58084",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58059",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58113",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58117",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58133",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00359",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5811",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35608"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016105",
                    "reference_id": "2016105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016105"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35608"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pq5z-fp69-sufy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79967?format=api",
            "vulnerability_id": "VCID-pw3f-uc38-5qcb",
            "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4588",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45927",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4587",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45811",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4583",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45772",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45798",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45948",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45896",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45952",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45949",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45972",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45944",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45951",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46003",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45998",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45895",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45906",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45848",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45747",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016108",
                    "reference_id": "2016108",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016108"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35622"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pw3f-uc38-5qcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79956?format=api",
            "vulnerability_id": "VCID-q2q2-ubam-fbh9",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53998",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54016",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54155",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54125",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54106",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54072",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54083",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54056",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54005",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54047",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54102",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5406",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54086",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54042",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54019",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5407",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54117",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54099",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54082",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54121",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35577"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016095",
                    "reference_id": "2016095",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016095"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35577"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q2q2-ubam-fbh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79950?format=api",
            "vulnerability_id": "VCID-qbyx-gq4t-rkhd",
            "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61805",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61879",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6206",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61979",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61983",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61965",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61963",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6198",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61972",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61917",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61964",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62025",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62006",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6191",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61881",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6193",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61947",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61969",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61957",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61937",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2478"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016089",
                    "reference_id": "2016089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016089"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2478"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbyx-gq4t-rkhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80418?format=api",
            "vulnerability_id": "VCID-qqae-rsw8-x7gp",
            "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52023",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52071",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52177",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5202",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5207",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52072",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52096",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52097",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52062",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52116",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52112",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52163",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52147",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52131",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52172",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52175",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52157",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52104",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52111",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52074",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2304"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951783",
                    "reference_id": "1951783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951783"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2304"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqae-rsw8-x7gp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79954?format=api",
            "vulnerability_id": "VCID-qtjn-m9ak-6ye1",
            "summary": "mysql: Server: Replication unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67326",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67362",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67574",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67439",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67451",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67429",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6746",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67459",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67434",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67478",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67516",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67488",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67512",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67385",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67415",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67428",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67449",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67437",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67403",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35546"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016093",
                    "reference_id": "2016093",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016093"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35546"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qtjn-m9ak-6ye1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79953?format=api",
            "vulnerability_id": "VCID-qzc8-kgrw-7yg2",
            "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34415",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35145",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34882",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34786",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3481",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35346",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35373",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35255",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35301",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35325",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35327",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3529",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35267",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35305",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35291",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35241",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35007",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34987",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34897",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34772",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34845",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35537"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016092",
                    "reference_id": "2016092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016092"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:08Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35537"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qzc8-kgrw-7yg2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79984?format=api",
            "vulnerability_id": "VCID-r4jk-v7qa-nkf9",
            "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34671",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34887",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34415",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34385",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34425",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3432",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34347",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34914",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34791",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34835",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34864",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34831",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34807",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34845",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34828",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34784",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34547",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34527",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3444",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34315",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35639"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016128",
                    "reference_id": "2016128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016128"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:10Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35639"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4jk-v7qa-nkf9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80403?format=api",
            "vulnerability_id": "VCID-r4wz-4cet-p3ch",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70736",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70751",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70994",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7091",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70946",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70912",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70941",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70769",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70745",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70789",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70805",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70828",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70812",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70797",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70842",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70848",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70826",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70879",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70889",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70887",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7087",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2213"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951771",
                    "reference_id": "1951771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951771"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2213"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4wz-4cet-p3ch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79961?format=api",
            "vulnerability_id": "VCID-rhr1-hje4-2qe6",
            "summary": "mysql: Server: Options unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45062",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45143",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45027",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45194",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45146",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45059",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45066",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45007",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44902",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44969",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44986",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44927",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44953",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45107",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4516",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45181",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45151",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45201",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35602"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016100",
                    "reference_id": "2016100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016100"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35602"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rhr1-hje4-2qe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80399?format=api",
            "vulnerability_id": "VCID-rr3t-1zsh-b7hm",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76812",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77054",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76999",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77003",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7686",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76878",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76914",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76919",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76942",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7695",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76952",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951768",
                    "reference_id": "1951768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951768"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2203"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rr3t-1zsh-b7hm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80417?format=api",
            "vulnerability_id": "VCID-suhd-prx3-k7fy",
            "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54796",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54866",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54963",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54858",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54916",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54876",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54902",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54891",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5486",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5491",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54908",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54921",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54903",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54879",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54917",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5492",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.549",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54875",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54895",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5487",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54816",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2301"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951782",
                    "reference_id": "1951782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951782"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2301"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-suhd-prx3-k7fy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79972?format=api",
            "vulnerability_id": "VCID-svv4-xj5y-5uad",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63297",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63203",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63255",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63215",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63135",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63193",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63159",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35627"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016113",
                    "reference_id": "2016113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016113"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:22Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35627"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-svv4-xj5y-5uad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79959?format=api",
            "vulnerability_id": "VCID-syty-vyfp-yygc",
            "summary": "mysql: Server: Error Handling unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53998",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54016",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54155",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54125",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54106",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54072",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54083",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54056",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54005",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54047",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54102",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5406",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54086",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54042",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54019",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5407",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54117",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54099",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54082",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00309",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54121",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35596"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016098",
                    "reference_id": "2016098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016098"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35596"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-syty-vyfp-yygc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79951?format=api",
            "vulnerability_id": "VCID-t6rb-2f2t-h7g3",
            "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67326",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67362",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67574",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67439",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67451",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67429",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6746",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67459",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67434",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67478",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67516",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67488",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67512",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67385",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67415",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67428",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67449",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67437",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67403",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2479"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016090",
                    "reference_id": "2016090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016090"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2479"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t6rb-2f2t-h7g3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79963?format=api",
            "vulnerability_id": "VCID-tatx-17xb-1qe1",
            "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52745",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52768",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.529",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52869",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52853",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52821",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52831",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52793",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52738",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52789",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52833",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.528",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52826",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52795",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52762",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52813",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52807",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52858",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52841",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52825",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52862",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35607"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016104",
                    "reference_id": "2016104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016104"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/",
                    "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/",
                    "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/",
                    "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35607"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tatx-17xb-1qe1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80398?format=api",
            "vulnerability_id": "VCID-tdsp-tezp-2qhy",
            "summary": "mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81135",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81144",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81381",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81304",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81326",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81322",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81339",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81167",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81166",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81194",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81199",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81219",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81205",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81198",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81235",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81237",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81257",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81265",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81271",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81285",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2202"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951767",
                    "reference_id": "1951767",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951767"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2202"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdsp-tezp-2qhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79971?format=api",
            "vulnerability_id": "VCID-twrq-tvwe-xkd1",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5474",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54811",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54905",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.548",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54856",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54816",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54842",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54803",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54845",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54822",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5486",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54844",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54818",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54838",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54813",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54758",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35626"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016112",
                    "reference_id": "2016112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016112"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:23Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35626"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-twrq-tvwe-xkd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79992?format=api",
            "vulnerability_id": "VCID-u8m3-6w1s-gyca",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5474",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54811",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54905",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.548",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54856",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54816",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54842",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54803",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54845",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54822",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5486",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54844",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54818",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54838",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54813",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54758",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35647"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016137",
                    "reference_id": "2016137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016137"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:02Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35647"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8m3-6w1s-gyca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80390?format=api",
            "vulnerability_id": "VCID-unnc-t1ky-c3fx",
            "summary": "mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80136",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80143",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80375",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80213",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80215",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80242",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80251",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80267",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80283",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80305",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80322",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80318",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80334",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80163",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80152",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8018",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80188",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80206",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80191",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80184",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80212",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2178"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951760",
                    "reference_id": "1951760",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951760"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2178"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unnc-t1ky-c3fx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80405?format=api",
            "vulnerability_id": "VCID-usjz-e1at-vubb",
            "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76812",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77054",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76999",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77003",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7686",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76878",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76914",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76919",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76942",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7695",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76952",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2217"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951773",
                    "reference_id": "1951773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951773"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2217"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-usjz-e1at-vubb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80419?format=api",
            "vulnerability_id": "VCID-vfxa-abgu-9ydp",
            "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54194",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54214",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54356",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54247",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54303",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54262",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54289",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54245",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5422",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54272",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54268",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54299",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54278",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54322",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54302",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54265",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5428",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54255",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54205",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2305"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951784",
                    "reference_id": "1951784",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951784"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2305"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vfxa-abgu-9ydp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78925?format=api",
            "vulnerability_id": "VCID-wt5d-srfd-3qhc",
            "summary": "mysql: C API unspecified vulnerability (CPU Oct 2022)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21595",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34216",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33628",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33506",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33576",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33618",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33529",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33552",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34249",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34112",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34155",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34184",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34141",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34117",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34154",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34106",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33734",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33711",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33625",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21595"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142862",
                    "reference_id": "2142862",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142862"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/",
                    "reference_id": "ntap-20221028-0013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:13Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221028-0013/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759",
                    "reference_id": "RHSA-2022:5759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826",
                    "reference_id": "RHSA-2022:5826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948",
                    "reference_id": "RHSA-2022:5948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306",
                    "reference_id": "RHSA-2022:6306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443",
                    "reference_id": "RHSA-2022:6443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-21595"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wt5d-srfd-3qhc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57164?format=api",
            "vulnerability_id": "VCID-wvxn-ugew-u7bj",
            "summary": "Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78469",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78585",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78642",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78618",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78602",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78506",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78489",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78516",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78522",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78547",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78529",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78521",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78549",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78548",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78545",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78578",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78475",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78708",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78669",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78653",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78657",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755",
                    "reference_id": "1951755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951755"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428",
                    "reference_id": "988428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/",
                    "reference_id": "AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-14",
                    "reference_id": "ASA-202105-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1882",
                    "reference_id": "AVG-1882",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1882"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/",
                    "reference_id": "DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/",
                    "reference_id": "GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-27",
                    "reference_id": "GLSA-202105-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-27"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-28",
                    "reference_id": "GLSA-202105-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-28"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/",
                    "reference_id": "JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/",
                    "reference_id": "PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007",
                    "reference_id": "RHSA-2022:1007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1007"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010",
                    "reference_id": "RHSA-2022:1010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556",
                    "reference_id": "RHSA-2022:1556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557",
                    "reference_id": "RHSA-2022:1557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1557"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818",
                    "reference_id": "RHSA-2022:4818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821",
                    "reference_id": "RHSA-2023:6821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6821"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/",
                    "reference_id": "UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5022-3/",
                    "reference_id": "USN-5022-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5022-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2166"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79993?format=api",
            "vulnerability_id": "VCID-x1ya-zfn1-ebdd",
            "summary": "mysql: Server: FTS unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35648",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5474",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54811",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54905",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.548",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54856",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54816",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54842",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54803",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54845",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54822",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5486",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54844",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54818",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54838",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54813",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54758",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35648"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016138",
                    "reference_id": "2016138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016138"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:01Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35648"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ya-zfn1-ebdd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80422?format=api",
            "vulnerability_id": "VCID-xjhs-6sgc-nfhu",
            "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35439",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35638",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35174",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35147",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35175",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35081",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35104",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35663",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35544",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3559",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35614",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35624",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35579",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35556",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35596",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35586",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35537",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35298",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35277",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35198",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35077",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2308"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951786",
                    "reference_id": "1951786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951786"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2308"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjhs-6sgc-nfhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80402?format=api",
            "vulnerability_id": "VCID-y3a3-tp5x-nqch",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76812",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77054",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76999",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77003",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7686",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76878",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76914",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76919",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76942",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7695",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76952",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2212"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951770",
                    "reference_id": "1951770",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951770"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2212"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y3a3-tp5x-nqch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79970?format=api",
            "vulnerability_id": "VCID-yvvh-5fmy-hkau",
            "summary": "mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29616",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29099",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2906",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29075",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28998",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29018",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29486",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29587",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29589",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29544",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2951",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29483",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29437",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29323",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29209",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29144",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35625"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016111",
                    "reference_id": "2016111",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016111"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518",
                    "reference_id": "RHSA-2022:6518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6518"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119",
                    "reference_id": "RHSA-2022:7119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7119"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5123-1/",
                    "reference_id": "USN-5123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-35625"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yvvh-5fmy-hkau"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80408?format=api",
            "vulnerability_id": "VCID-zkmv-3qu7-4kee",
            "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2230",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76812",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77054",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76999",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77003",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76848",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7686",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76878",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76914",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76919",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76942",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7695",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76952",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2230"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951775",
                    "reference_id": "1951775",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951775"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325",
                    "reference_id": "987325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3590",
                    "reference_id": "RHSA-2021:3590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3811",
                    "reference_id": "RHSA-2021:3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4952-1/",
                    "reference_id": "USN-4952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-2230"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkmv-3qu7-4kee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68657?format=api",
            "vulnerability_id": "VCID-zt2v-9ka8-g3ff",
            "summary": "mysql: DML unspecified vulnerability (CPU Jul 2025)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50076.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-50076.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29254",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29328",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29295",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29378",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31234",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31287",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31201",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31215",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31188",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31028",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30907",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30823",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32265",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3219",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00132",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32253",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59087",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59158",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59059",
                            "published_at": "2026-05-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-50076"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380316",
                    "reference_id": "2380316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380316"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2025.html",
                    "reference_id": "cpujul2025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T14:26:39Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2025.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931411?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.28-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/931406?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076094?format=api",
                    "purl": "pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2025-50076"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zt2v-9ka8-g3ff"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.28-1%3Fdistro=sid"
}