{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","type":"deb","namespace":"debian","name":"mysql-8.0","version":"8.0.30-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.0.31-1","latest_non_vulnerable_version":"8.0.46-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79222?format=json","vulnerability_id":"VCID-2jks-ehmr-73aj","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21534","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60354","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21534"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115294","reference_id":"2115294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21534"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2jks-ehmr-73aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79210?format=json","vulnerability_id":"VCID-3w7d-u3hs-x7fr","summary":"mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21455","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55495","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55514","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55497","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55537","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58063","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58048","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5811","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58083","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58049","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21455"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115282","reference_id":"2115282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21455"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3w7d-u3hs-x7fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79213?format=json","vulnerability_id":"VCID-5587-7c63-xfgg","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21517","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35033","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3494","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34982","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34981","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.5979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59851","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21517"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115285","reference_id":"2115285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115285"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21517"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5587-7c63-xfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79218?format=json","vulnerability_id":"VCID-7wzz-nva6-yqaz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21528","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60354","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21528"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115290","reference_id":"2115290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115290"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21528"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7wzz-nva6-yqaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79221?format=json","vulnerability_id":"VCID-8tpm-5kqs-efhd","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21531","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60354","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21531"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115293","reference_id":"2115293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115293"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21531"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8tpm-5kqs-efhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79214?format=json","vulnerability_id":"VCID-ae8p-nu59-mfb2","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21522","reference_id":"","reference_type":"","scores":[{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47941","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47961","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47938","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47948","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.48002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47997","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70945","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70984","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.71021","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21522"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115286","reference_id":"2115286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115286"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21522"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae8p-nu59-mfb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79223?format=json","vulnerability_id":"VCID-bk52-etdq-8bgt","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21537","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60354","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21537"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115295","reference_id":"2115295","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115295"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21537"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bk52-etdq-8bgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79217?format=json","vulnerability_id":"VCID-cehv-gwcs-eudz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21527","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60354","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21527"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115289","reference_id":"2115289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21527"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cehv-gwcs-eudz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79227?format=json","vulnerability_id":"VCID-ctj6-46ju-ybaa","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21553","reference_id":"","reference_type":"","scores":[{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55837","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55791","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55733","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58908","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58885","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21553"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115299","reference_id":"2115299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21553"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctj6-46ju-ybaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79219?format=json","vulnerability_id":"VCID-gs25-yymm-e3ak","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21529","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60354","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21529"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115291","reference_id":"2115291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:22Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21529"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gs25-yymm-e3ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79229?format=json","vulnerability_id":"VCID-hv87-q417-8qd3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21569","reference_id":"","reference_type":"","scores":[{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61757","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61693","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61646","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61698","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65138","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65066","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65115","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.6511","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21569"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115301","reference_id":"2115301","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21569"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hv87-q417-8qd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79216?format=json","vulnerability_id":"VCID-jvss-882h-63bb","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21526","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41591","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70984","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.71021","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70945","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21526"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115288","reference_id":"2115288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21526"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvss-882h-63bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78745?format=json","vulnerability_id":"VCID-m997-zjm1-uffn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21872","reference_id":"","reference_type":"","scores":[{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65208","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65118","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65165","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65112","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65105","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65134","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21872"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162279","reference_id":"2162279","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21872"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m997-zjm1-uffn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79220?format=json","vulnerability_id":"VCID-mq1t-yqxh-rkhv","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21530","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60354","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21530"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115292","reference_id":"2115292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115292"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21530"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mq1t-yqxh-rkhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78939?format=json","vulnerability_id":"VCID-p2hz-hqhw-zqhk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21638","reference_id":"","reference_type":"","scores":[{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64913","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64845","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64841","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64822","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64869","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64738","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64779","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64815","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64832","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21638"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142876","reference_id":"2142876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142876"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21638"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2hz-hqhw-zqhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79226?format=json","vulnerability_id":"VCID-qra2-ejj6-sqgv","summary":"mysql: Server: Federated unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21547","reference_id":"","reference_type":"","scores":[{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55837","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55791","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55733","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58908","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58885","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21547"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115298","reference_id":"2115298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21547"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qra2-ejj6-sqgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78937?format=json","vulnerability_id":"VCID-sc1z-ry96-duc7","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21635","reference_id":"","reference_type":"","scores":[{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.7182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71986","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71932","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.7193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.7192","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71955","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71862","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71868","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71899","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71928","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21635"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142874","reference_id":"2142874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142874"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21635"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sc1z-ry96-duc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79225?format=json","vulnerability_id":"VCID-tupa-3adt-33hf","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21539","reference_id":"","reference_type":"","scores":[{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60503","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60437","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60444","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64034","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64046","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63975","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64003","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64013","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21539"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115297","reference_id":"2115297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21539"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tupa-3adt-33hf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79224?format=json","vulnerability_id":"VCID-u26p-pxhd-6fhm","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21538","reference_id":"","reference_type":"","scores":[{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50156","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50197","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50203","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50074","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57686","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57684","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21538"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115296","reference_id":"2115296","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21538"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u26p-pxhd-6fhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79212?format=json","vulnerability_id":"VCID-ujcd-zae5-fkc3","summary":"mysql: Server: Options unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21515","reference_id":"","reference_type":"","scores":[{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57516","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57503","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5748","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57409","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57454","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73053","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73085","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73102","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73096","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73139","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21515"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115284","reference_id":"2115284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115284"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://usn.ubuntu.com/5537-2/","reference_id":"USN-5537-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21515"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ujcd-zae5-fkc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79211?format=json","vulnerability_id":"VCID-umkj-5zap-zkgk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21509","reference_id":"","reference_type":"","scores":[{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4461","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4465","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44707","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49178","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49135","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49115","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49142","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49169","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21509"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115283","reference_id":"2115283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21509"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-umkj-5zap-zkgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78941?format=json","vulnerability_id":"VCID-vyqe-sag1-c3gm","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21641","reference_id":"","reference_type":"","scores":[{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.64039","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63949","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63993","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63913","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63958","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63966","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142878","reference_id":"2142878","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142878"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21641"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vyqe-sag1-c3gm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78923?format=json","vulnerability_id":"VCID-wuuw-gec8-7fh2","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21592","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61233","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61176","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61124","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61173","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61192","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61198","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61168","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21592"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142860","reference_id":"2142860","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142860"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"},{"reference_url":"https://usn.ubuntu.com/5696-2/","reference_id":"USN-5696-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21592"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wuuw-gec8-7fh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79228?format=json","vulnerability_id":"VCID-x9ts-bdrn-ufha","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21556","reference_id":"","reference_type":"","scores":[{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55483","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55514","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55431","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55426","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59472","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59493","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59439","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59456","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21556"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115300","reference_id":"2115300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21556"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x9ts-bdrn-ufha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79215?format=json","vulnerability_id":"VCID-y6n1-n99c-yfcu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21525","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41591","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.5979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59851","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21525"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115287","reference_id":"2115287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115287"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931413?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.30-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2022-21525"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y6n1-n99c-yfcu"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.30-1%3Fdistro=sid"}